Googlebook

https://www.gstatic.com/marketing-cms/assets/images/27/26/efcc236844ccb833b92620413427/magic-cursor-band-assets.webp=n-w353-h285-fcrop64=1,000009fbfffff605-rw
Meet Googlebook: A new kind of laptop designed for Gemini Intelligence. Built with heavyweight power and perfectly in sync with your Android Phone. Sign up for updates and stay in the know.

How to make your text look futuristic (2016)

https://typesetinthefuture.com/wp-content/uploads/2016/06/futuristic_logo_1.png?w=560&h=315
The article discusses six rules to create a futuristic movie title, including adding an italic slant, curvy and angular shapes, consummate Vs, combined letters, removing text segments, and adding noise textures. These rules are demonstrated in various movie titles such as Blade Runner, Battlestar Galactica, and Star Wars.

CERT is releasing six CVEs for serious security vulnerabilities in dnsmasq

CERT is releasing six CVEs for serious dnsmasq security vulnerabilities. Patches are available and a new stable release, dnsmasq-2.92rel2, has been made with the fixes applied.

Show HN: Needle: We Distilled Gemini Tool Calling into a 26M Model

https://raw.githubusercontent.com/cactus-compute/needle/main/assets/banner.png
Gemini 3.1 was distilled into a 26m Simple Attention Network, Needle, for consumer devices. Needle outperforms other models in single-shot function calls but may be finicky and less effective in conversational settings.

Why senior developers fail to communicate their expertise

https://www.nair.sh/_next/image?url=%2Fimages%2Fwsdftc%2Fwsdftc_cover.png&w=3840&q=75&dpl=dpl_EJNiu3FBjkX8yJSwwGtmqoePQNU6
Senior developers worry about complexity, while others want to reduce uncertainty. They should communicate solutions in terms of uncertainty reduction, not complexity management.

The Future of Obsidian Plugins

https://obsidian.md/images/blog/2026-community-search.png
Obsidian Community is launched with a new directory and developer dashboard for plugins and themes. Automated reviews ensure safety and security of the Obsidian ecosystem.

Rendering the Sky, Sunsets, and Planets

https://assets.maximeheckel.com/images/blog/shuttle.webp?w=3840&q=100
The user implemented an atmospheric scattering shader post-processing effect to render a realistic sky and atmosphere in real-time, using raymarching, Rayleigh and Mie scattering, and ozone absorption to achieve a natural color for any altitude. The user also explored a more performant approach using Look Up Tables (LUTs) to store precomputed scattering calculations, resulting in a ...

Quack: The DuckDB Client-Server Protocol

https://duckdb.org/images/blog/quack/quack-bulk-light.svg
DuckDB instances can now communicate with each other using the Quack protocol, enabling client-server setups and concurrent writers. Quack is built on HTTP and optimized for low overhead and fast bulk data transfer.

Reimagining the mouse pointer for the AI era

https://lh3.googleusercontent.com/wWMpunJ0UQ5yomIfjIYxftmiZzTdZqvze2_g9HtVShA2jqPxqu8v9KFimrYSHs22fvjkfjJY0XGLwvbyXE_GRUQSK3CPjcJY-fqRASGrNbLltuHGDpc=w1440-h810-n-nu
Google is developing an AI-enabled pointer called Gemini to simplify interactions with computers by understanding context and intent. The pointer will work across all apps, allowing users to point and speak to get information without needing to write complex prompts.

Learning Software Architecture

To learn software design skills as a researcher physicist, it's essential to understand that software design is best learned by doing and adapting to the social context of the project, rather than following formal rules or guidelines. Key recommendations include practicing, paying attention to boundaries, testing, and Conway's Law, and considering resources such as the Boundaries talk by Gary ...

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim

https://cdn.prod.website-files.com/686c11d5bee0151a3f8021d6/6a03271477c3b2aa1e7eaaec_BLOG-Dead-Letter-CVE-2026-45185-01.png
A vulnerability in Exim's TLS connection handling was discovered and reported, allowing for remote code execution with almost no special server configuration. The vulnerability was exploited using a large language model (LLM) in a contest, with the LLM producing a working solution for the first stage of the exploit.

Launch HN: Voker (YC S24) – Analytics for AI Agents

https://cdn.prod.website-files.com/69d57891b4f6c4aff88c95ff/69eb2618ec2c1cafb08e32be_Voker%20Icon%20Set_Usage%20Data%201.svg
Voker provides analytics for AI agents, offering insights into performance and outcomes. It helps teams track agent interactions, identify knowledge gaps, and measure improvement over time.

Bambu Lab is abusing the open source social contract

Bambu Lab is threatening an open source developer with legal action for using their code in a fork of OrcaSlicer. They claim the developer is impersonating their client and creating a security risk, but the developer says they're just using upstream code verbatim.

Is this why science advances one funeral at a time?

https://lede-admin.nautil.us/wp-content/uploads/sites/70/2026/04/Grant_HERO_f5ad9e.png?resize=2880%2C1920
For centuries, science has been a top-heavy enterprise. A vanishingly small number of field-leading experts has the propensity to shape knowledge. They who win the Nobels. They who secure the multi-year, millions-of-dollars grants. They who rewrite the textbooks. Other workers in science are merely passing through, riding the coattails of these giants. But how does a researcher’s capacity for ...

Beyond Semantic Similarity

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
Researchers found that direct corpus interaction outperforms conventional retrieval systems in agentic search tasks by allowing agents to interact with the raw corpus directly. This approach adapts to evolving corpora and achieves strong accuracy without relying on semantic retrievers.

Show HN: Statewright – Visual state machines that make AI agents reliable

https://raw.githubusercontent.com/statewright/statewright/main/docs/images/workflow-editor.png
Statewright is a tool that enforces workflow constraints on AI agents to prevent overfitting and improve performance. It uses state machines to limit tool access and provide clear instructions to the model at each phase.

Show HN: Agentic interface for mainframes and COBOL

https://www.hypercubic.ai/_next/image?url=%2Fassets%2Fhopper%2Fhopper_hero_img.jpg&w=3840&q=75
Hopper uses AI agents to navigate and operate inside z/OS from a modern development environment. It drives ISPF, writes JCL, and queries VSAM with SQL-like functionality.

When life gives you lemons, write better error messages

https://miro.medium.com/v2/resize:fit:813/1*TpQzPue3oTK6J6oYZyQTtA.png
Wix revamped its error messages to be clear, concise, and user-friendly. They defined what makes a good error message and worked together to replace thousands of generic and unclear messages.

Screenshots of Old Desktop OSes

http://www.typewritten.org/Media/Thumbs/thn-visi-on-1.0.png
The user provided a large collection of screenshots showcasing various operating systems and graphical user interfaces from the 1980s to the early 2000s, including GEM, OS/2, Windows, and NeXTSTEP. The screenshots demonstrate the evolution of GUIs, highlighting the differences in design, functionality, and performance across various platforms and releases.

A Preview of the Future

https://unsung.aresluna.org/_media/a-preview-of-the-future/ogimage.png
Shelby from Tech Tangents reviewed the IBM 3119, a 1980s flatbed scanner, and highlighted its "curves" feature that allowed users to adjust shades of gray in real-time. This feature was made possible by a clever use of palette swapping on the graphic card, allowing for fast and interactive adjustments.

Canada’s Bill C-22 Is a Repackaged Version of Last Year’s Surveillance Nightmare

https://www.eff.org/files/banner_library/encryption-poc-chelsea-saunders.png
Canadian government's Bill C-22, the Lawful Access Act, erodes digital rights by forcing companies to record and retain metadata and create backdoors for law enforcement. This bill expands surveillance and data sharing with foreign governments, threatening Canadians' privacy and digital security.

We accidentally recreated old Facebook

https://amrshawky.com/images/interface-bg.png
PicPocket.io is a platform that reuses chat interfaces for photo sharing and organization, allowing users to find memories by people in the photos. The platform has evolved into a feed-based social network with a focus on sharing content with specific audiences, similar to old Facebook.

Testing UPS Output Waveforms

The user tested various UPS models from APC and Eaton, measuring their output signals using an oscilloscope and a Chroma 61507 AC power source. The results showed varying levels of waveform quality, with some models producing pure sine waves and others simulated sine waves with blocky or jagged signals.

Show HN: Gigacatalyst – Extend your SaaS with an embedded AI builder

Namanyay from Gigacatalyst offers an AI customization layer for SaaS platforms, allowing non-technical users to build custom workflows via natural language. This helps businesses save time and increase revenue by reducing custom requests and engineering roadmaps.

Text Blaze (YC W21) Is Hiring for a No-AI Summer Internship

https://bookface-images.s3.amazonaws.com/small_logos/3155ba3b687741c19a97719f6f226e3e148c98f5.png
We're offering a "No AI Summer" internship for junior developers to learn full-stack engineering without AI tools, focusing on JavaScript, React, and GCP. The internship aims to develop critical thinking and problem-solving skills in a challenging environment with a small team.

Instructure pays ransom to Canvas hackers

https://www.insidehighered.com/sites/default/files/styles/max_650x650/public/2026-05/hacking_lock.jpg?itok=mGymN76y
Instructure paid a ransom to hackers who breached its learning management system Canvas, returning data of 275 million users. The company claims hackers have destroyed the data and will not extort customers, but the deal's value remains undisclosed.

The Real Story of Troy

Heinrich Schliemann discovered Troy in 1873 but found a 2400 BC treasure, 1000 years before the Trojan War. His 17-meter trench destroyed half of the site, and he misdated the treasure by a millennium.

They Live (1988) inspired Adblocker

https://raw.githubusercontent.com/davmlaw/they_live_adblocker/main/docs/they-live-billboards.jpg
A fork of uBlock Origin Lite, uBOLite_theylive, replaces cosmetic-blocked ads with white tiles bearing They Live slogans. It requires manual installation and configuration in Chromium-based browsers.

SQL: Incorrect by Construction

The original TSQL money-transfer procedure has critical concurrency bugs including partial transfers and TOCTOU bugs due to lack of transactions and row-level locks. To fix these bugs, transactions should be atomic by default, row-level locks should be acquired upfront, and deadlocks should be detected through static analysis.

The Surprisingly Long Life of the Vacuum Tube

https://substackcdn.com/image/fetch/$s_!s3OW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48d5bbd5-2579-4ffb-9519-47997926caae_1200x854.png
Vacuum tubes, invented in the 19th century, enabled numerous technological advancements, including radios, TVs, computers, and medical equipment. They were eventually replaced by semiconductor-based technologies, but many vacuum tube devices remain in use today.