Category Theory Illustrated – Orders

https://abuseofnotation.github.io/category-theory-illustrated/04_order/binary_relation_product.svg
Orders are sets of elements with a binary relation that obeys laws of reflexivity, transitivity, antisymmetry, and totality, defining linear and partial orders. Removing laws from orders results in different structures, such as preorders and equivalence relations, which have various applications in mathematics and computer science.

Amiga Graphics

https://amiga.lychesis.net/assets/Park/Park_AdmiralKirk.png
Launched in 1985 the Commodore Amiga boasted graphics capabilities that were unsurpassed for it's time. It featured an intricate collection of custom chips that enabled it to do things that, until then, had been impossible to achieve with other personal computers. This site is dedicated to graphics made with or for the Commodore Amiga home computer.

Show HN: I made a calculator that works over disjoint sets of intervals

This calculator uses Interval Union Arithmetic to compute results that contain the true value, supporting division by intervals with zero and remaining closed. It interprets numbers as intervals with outward rounding over IEEE 754 double precision floats.

Claude Design

https://www.anthropic.com/_next/image?url=https%3A%2F%2Fwww-cdn.anthropic.com%2Fimages%2F4zrzovbb%2Fwebsite%2F499e91975d880b35eac6e48ad43161de7d10416c-2876x1614.jpg&w=3840&q=75
Claude Design is a new product that lets users collaborate with Claude to create visual work like designs, prototypes, and presentations. It's available in research preview for Claude Pro, Max, Team, and Enterprise subscribers, with access included in their plans.

The simple geometry behind any road

https://sandboxspirit.com/_astro/circles.CshujFWj_Z1dkoK7.webp?dpl=dpl_7yBRDnY9mQCHx9XxEPrjXqyLjC41
The author explains how to generate smooth roads using lines and circular arcs by interpolating between abstract cross-sections called profiles, and describes a method to connect two profiles using a two-line fillet construction. The author also discusses how to handle edge cases, such as roads that shift or turn, by using cubic Hermite splines to find a good candidate position and ...

Measuring Claude 4.7's tokenizer costs

https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,quality=80,format=auto,onerror=redirect/uploads/user/profile_picture/a49d6fd3-0a5e-4774-ae9c-16979bd47642/Generated_Image_March_03__2026_-_1_55PM.jpg.jpeg
Anthropic's new Claude Opus 4.7 tokenizer uses 1.3-1.45x more tokens than 4.6. This results in a 20-30% higher per-session cost for a small but real improvement in instruction following.

Towards trust in Emacs

https://eshelyaron.com/assets/trust-manager.gif
Emacs 30 introduced a trust system to prevent arbitrary code execution, but it causes friction by disabling features for untrusted files. trust-manager is a new package that grants trust just-in-time with minimal friction.

All 12 moonwalkers had "lunar hay fever" from dust smelling like gunpowder (2018)

https://www.esa.int/var/esa/storage/images/esa_multimedia/images/2015/03/eugene_cernan/15299754-1-eng-GB/Eugene_Cernan_article.jpg
Lunar dust is toxic and causes health issues in humans due to its sharp, abrasive particles and electrostatic charge. Researchers are studying the dust to estimate the risk and develop protective measures for future lunar missions.

Rewriting Every Syscall in a Linux Binary at Load Time

https://substackcdn.com/image/fetch/$s_!lyym!,f_auto,q_auto:best,fl_progressive:steep/https%3A%2F%2Famitlimaye1.substack.com%2Ftwitter%2Fsubscribe-card.jpg%3Fv%3D131273884%26version%3D9
A binary rewriter replaces syscall instructions in a process's code with a trap that redirects to a custom handler, allowing for complete control over the process's interaction with the outside world. This approach provides a foundation for a minimal VM runtime where untrusted code can run inside a controlled environment with full visibility and control, at a cost of under a microsecond per syscall.

Spending 3 months coding by hand

https://substackcdn.com/image/fetch/$s_!K739!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F619758e3-8a22-4eff-aa30-e86effa991cd_1536x1024.png
The author is on a 6-week retreat at the Recurse Center to focus on coding without AI, learn Python, and understand computers better. They plan to train an LLM from scratch and improve their programming skills.

A simplified model of Fil-C

Fil-C is a memory-safe implementation of C/C++ that uses a garbage collector and rewrites unsafe code into safe code, including adding AllocationRecord* variables to track memory usage. The simplified model of Fil-C includes a compiler pass that rewrites C/C++ source code, a garbage collector, and additional features such as invisible_bytes and a parallel concurrent incremental collector.

It is incorrect to "normalize" // in HTTP URL paths

RFC 3986 allows for empty segments in a URI path and a double slash is syntactically meaningful, representing a zero-length segment between two separators. Collapsing // to / in a URI path is not correct normalization and can produce a different, non-equivalent identifier unless the origin explicitly defines those two paths as equivalent.

Are the costs of AI agents also rising exponentially? (2025)

https://images.squarespace-cdn.com/content/v1/562652dbe4b05bbfdc596fd7/8b1fd882-f8f8-4879-a008-18902ece6edd/METR+time+horizon+%28log%29.png
The author questions the trend of AI's exponential growth in task length and performance, suggesting that the cost of achieving this performance may be growing exponentially as well, potentially making AI less cost-competitive with humans over time. Analysis of a chart from METR shows that the hourly cost of AI agents is increasing with task duration, suggesting that forecasting AI's ...

Brunost: The Nynorsk Programming Language

https://lindbakk.com/static/blog_entries/introducing_brunost/2026-04-14-17-20-39-image.png
The user created a fictional programming language called Brunost, which is based on the Norwegian language Nynorsk and has a unique syntax and features. Brunost is intended as a fun and educational project, not a production-ready language, and the user invites others to contribute to its development on GitHub.

Show HN: Smol machines – subsecond coldstart, portable virtual machines

https://opengraph.githubassets.com/e0e5b6e04690f3f617b2c3a33cb8128ad7ef75ce5c19841be277e075c7dbe120/smol-machines/smolvm
Smolmachines is a tool for running custom Linux virtual machines locally with sub-second cold start, cross-platform support, and elastic memory usage. It allows for sandboxing untrusted code, packing workloads into portable executables, and using git and SSH without exposing keys.

Slop Cop

Slop Cop is a browser-based writing editor that flags generic LLM prose patterns and offers deeper analysis with an Anthropic API key. It helps improve writing by identifying and suggesting edits for common structural and rhetorical issues.

Show HN: PanicLock – Close your MacBook lid disable TouchID –> password unlock

https://raw.githubusercontent.com/paniclock/paniclock/main/assets/paniclock-logo-and-name-v1.png
PanicLock is a macOS utility that instantly locks the screen and disables Touch ID with a single click or laptop lid closure. It requires a one-time admin password setup to install a privileged helper tool.

"cat readme.txt" is not safe if you use iTerm2

https://substackcdn.com/image/fetch/$s_!QNEg!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a02736f-409b-4fac-879f-7f0fcaaad68d_2318x1326.png
iTerm2's SSH integration feature can be exploited by impersonating the remote conductor through terminal output. This allows an attacker to execute arbitrary commands on the local machine.

Hyperscalers have already outspent most famous US megaprojects

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Middle schooler finds coin from Troy in Berlin

A 13-year-old in Berlin discovered a 2,300-year-old bronze coin from ancient Troy, now on display at the PETRI Museum. The coin likely traveled along ancient trade routes, possibly kept as a charm or offering to the dead, rather than used for a business transaction.

NASA Force

https://nasaforce.gov/mission-image-1.webp
NASA Force is a hiring initiative for exceptional technologists to join NASA for 1-2 years, solving complex challenges in air and space. You'll work on real missions, take a systems approach, and contribute to advancing human spaceflight and scientific discovery.

Landmark ancient-genome study shows surprise acceleration of human evolution

https://media.nature.com/lw767/magazine-assets/d41586-026-01204-5/d41586-026-01204-5_52289740.jpg
Researchers found 479 gene variants that evolved through natural selection in ancient people from western Eurasia after the dawn of agriculture, leading to widespread health changes in present-day populations. The study suggests human evolution accelerated over the past 10,000 years, particularly during the Bronze Age, with changes in genes linked to immunity, skin tone, and other traits.

Making Wax Sealed Letters at Scale

https://waxletter.com/single_letter_no_bg.webp
Our wax seal mailing service prints, seals, and mails custom letters at scale with a personal touch. We handle bulk mail orders efficiently while maintaining a hand-crafted feel.

NIST gives up enriching most CVEs

https://risky.biz/static/img/catalin-cimpanu.jpg
The US National Institute of Standards and Technology (NIST) has announced a new policy to prioritize only important vulnerabilities in the US National Vulnerability Database due to budget constraints. This decision is expected to impact the cybersecurity industry, with some companies relying on NIST's data for their vulnerability scanners and dashboards.

Casus Belli Engineering

https://marcosmagueta.com/images/8949c761.jpeg
Casus Belli Development is a social mechanism where a perceived failure is used to replace a working system with a preferred worldview, often driven by individuals who use narrative to construct guilt and manipulate the system. This mechanism exploits cognitive biases and organizational dynamics, leading to the destruction of proven foundations and the perpetuation of root causes, and can be ...

The Unix executable as a Smalltalk method (2025) [video]

Arc Prize Foundation (YC W26) Is Hiring a Platform Engineer for ARC-AGI-4

The role requires a senior engineer to own and evolve the platform behind ARC-AGI benchmarks, stabilizing the current system and laying the foundation for future versions. The ideal candidate has strong backend engineering experience with Python and distributed systems.

Introducing: ShaderPad

The author released ShaderPad, a library for easily putting shaders on websites without rebuilding graphics scaffolding. It's designed for artists and creative coders, with a simple API and fast page loads due to its small size.

The GNU libc atanh is correctly rounded

https://inria.hal.science/.within.website/x/cmd/anubis/static/img/pensive.webp?cacheBuster=devel
Anubis is a server protection system that uses a Proof-of-Work scheme to prevent aggressive website scraping. It adds a load that makes scraping expensive, but may cause downtime for legitimate users.

Ban the sale of precise geolocation

https://lawfare-assets-new.azureedge.net/assets/images/default-source/article-images/world-map-cybersecurity.jpg?sfvrsn=5d9bbb64_4
The US needs to clamp down on the collection and sale of geolocation data to protect national security and privacy, as seen in the case of Webloc, a tool used by US and foreign authorities to track individuals. A new report highlights the risks of AI-powered hacking, as a single hacker used AI models to breach nine Mexican government organizations and steal hundreds of millions of citizen records.