Peter Steinberger – WhatsApp CLI: sync, search, send

https://opengraph.githubassets.com/c5a4f61b54256ab4456b73eb3b1b894d7bec8ec2721fae52717e2031a3c80d97/steipete/wacli
To use the WhatsApp Web protocol via whatsmeow, install via Homebrew and authenticate with pnpm wacli auth.

Fixing a 20-year-old bug in Enlightenment E16

https://iczelia.net/static/desktop-e16.jpg
The editor in chief of this blog was born in 2004 and uses the 1997 window manager Enlightenment E16. She fixed a rare bug in the codebase dating back to 2006 caused by a faulty Newton's algorithm implementation.

Dependency cooldowns turn you into a free-rider

https://calpaterson.com/images/photo/snow-house.jpeg
The author argues that dependency cooldowns, which delay adopting new versions of packages, are not a good solution to supply chain attacks and instead proposes using upload queues, which delay distributing new packages until they have been reviewed. Upload queues can be implemented in central dependency servers and have several benefits, including reducing the power of release credentials ...

Claude Code Routines

https://claude-code.mintlify.app/_next/image?url=%2F_mintlify%2Fapi%2Fog%3Fdivision%3DClaude%2BCode%2Bon%2Bthe%2Bweb%26appearance%3Dsystem%26title%3DAutomate%2Bwork%2Bwith%2Broutines%26description%3DPut%2BClaude%2BCode%2Bon%2Bautopilot.%2BDefine%2Broutines%2Bthat%2Brun%2Bon%2Ba%2Bschedule%252C%2Btrigger%2Bon%2BAPI%2Bcalls%252C%2Bor%2Breact%2Bto%2BGitHub%2Bevents%2Bfrom%2BAnthropic-managed%2Bcloud%2Binfrastructur%26logoLight%3Dhttps%253A%252F%252Fmintcdn.com%252Fclaude-code%252Fc5r9_6tjPMzFdDDT%252Flogo%252Flight.svg%253Ffit%253Dmax%2526auto%253Dformat%2526n%253Dc5r9_6tjPMzFdDDT%2526q%253D85%2526s%253D78fd01ff4f4340295a4f66e2ea54903c%26logoDark%3Dhttps%253A%252F%252Fmintcdn.com%252Fclaude-code%252Fc5r9_6tjPMzFdDDT%252Flogo%252Fdark.svg%253Ffit%253Dmax%2526auto%253Dformat%2526n%253Dc5r9_6tjPMzFdDDT%2526q%253D85%2526s%253D1298a0c3b3a1da603b190d0de0e31712%26primaryColor%3D%25230E0E0E%26lightColor%3D%2523D4A27F%26darkColor%3D%25230E0E0E%26backgroundLight%3D%2523FDFDF7%26backgroundDark%3D%252309090B&w=1200&q=100
Claude Code routines are saved configurations that run automatically on Anthropic-managed cloud infrastructure. They can be triggered by schedule, API, or GitHub events, and can perform tasks such as code review, deployment verification, and documentation updates.

My adventure in designing API keys

https://vjay15.github.io/images/github.png
The author discusses API key creation and design, explaining the standard format and its components. They then explore different approaches to mapping API keys to account IDs in a multi-tenant system.

Rare concert recordings are landing on the Internet Archive

https://techcrunch.com/wp-content/uploads/2026/04/GettyImages-2244156491-1.jpg?w=1024
The Internet Archive has posted 2,500 rare punk tapes, including Nirvana's 1989 performance and previously unknown recordings from Sonic Youth and R.E.M. Volunteers digitize and clean up the tapes, making them sound great despite being recorded with mediocre equipment.

MDalgorithms (AI Healthcare) – Hiring Growth Marketer – Remote – $80K-$140K

A rare opportunity to be a Creative Strategist at MDalgorithms (https://www.mdalgorithms.com), a fast-growing AI consumer technology company ✨ About the company & mission Today 90% of people can't afford to visit a Dermatologist. Our brands, MDhair, MDacne and Nuvane automatically analyze the skin or hair using our AI technology and then deliver a customized treatment kit to the ...

Not all elementary functions can be expressed with exp-minus-log

The paper by Andrzej Odrzywołek claims that elementary functions can be expressed with a single operator, but this definition is narrower than standard mathematical usage.

Founders Need to Be Ruthless When Chasing Deals

https://i0.wp.com/steveblank.com/wp-content/uploads/2024/04/purchase-order.jpg?resize=112%2C112&ssl=1
One of the most exciting things a startup CEO in a business-to-business market can hear from a potential customer is, “We’re excited. When can you come back and show us a prototype?” This can be the beginning of a profitable customer relationship or a disappointing sinkhole of wasted time, money, resources, and a demoralized engineering team. I was having coffee and pastries with Justin, an ...

Amazon to acquire Globalstar and expand Amazon Leo satellite network

You don't have permission to access "http://www.businesswire.com/news/home/20260414237496/en/Amazon-to-Acquire-Globalstar-and-Expand-Amazon-Leo-Satellite-Network" on this server.

A communist Apple II and fourteen years of not knowing what you're testing

https://preview.redd.it/a-brief-history-of-the-bulgarian-personal-computers-imko-v0-0xysb4xiqii61.jpg?width=1214&format=pjpg&auto=webp&s=5af7ef4b6cc57f1a5af09530c4ae8a3e3e553a12
The author reflects on the current AI hype and the value of reverse engineering, which involves understanding a design to reproduce and adapt it. The author shares personal experiences with reverse engineering, including the Bulgarian Правец computer and the ISCAS-85 benchmarks, highlighting its importance in understanding technology.

Installing OpenBSD on the Pomera DM250 Writerdeck

https://jcs.org/images/2026-04-09-hero-680x355.jpg
To install OpenBSD on a Japanese-model Pomera DM250, you need a custom kernel and U-Boot image, and follow specific steps to boot the device into recovery mode and write the new U-Boot image to the eMMC. After installing OpenBSD, you can customize the device by setting up the keyboard layout, creating a custom kernel, and addressing the LEDs near the USB-C port.

The Orange Pi 6 Plus

https://taoofmac.com/media/reviews/2026/04/11/1900/gXPeL88wnWdIRTzHXp4uBm8vFnU=/hero.jpg
The Orange Pi 6 Plus, a board with a CIX P1 SoC, showed promising hardware but struggled with software issues, requiring custom OS images and vendor-specific GPU and NPU userspace. Despite these challenges, the board proved usable for local AI work, with some models and runtimes performing well, but its high power draw and loud fan made it less attractive as a low-traffic always-on appliance.

Understanding Clojure's Persistent Vectors, pt. 1 (2013)

https://hypirion.com/sha/a90ab1743d3840abf7251f797e8cc0d0a05e42bdab57c0dfa91d3eac4adcd0e3.png
Clojure's persistent vectors use balanced, ordered trees to achieve O(1) runtime for appends, updates, lookups, and subvec operations while maintaining persistence. The tree structure is shallow due to a high branching factor, allowing for "effectively" constant time modifications and lookups, although technically O(log32 n).

Stop Flock

https://stopflock.com/images/FlockCam1.png
Flock Safety's AI-powered cameras track vehicles and people, creating detailed records of movements and associations without consent. This mass surveillance raises Fourth Amendment concerns and enables biased enforcement.

Don't feel like exercising? Maybe it's the wrong time of day for you

https://ichef.bbci.co.uk/news/480/cpsprodpb/4c6f/live/aef2a2b0-3759-11f1-a6a0-913b15480fa1.jpg.webp
People should exercise at times that match their natural body clock for maximum health benefits, with morning exercise best for early risers and evening exercise for night owls. This approach can boost heart health, lower blood pressure and improve sleep quality, especially for those at higher risk of heart disease.

Picasso’s Guernica (Gigapixel)

https://guernica.museoreinasofia.es/gigapixel/img/share-image.jpg
La pintura presenta cuarteado, cazoletas y desprendimiento de la capa pictórica. Se aplica un cubriente de color para reparar o modificar el original, y se observan líneas de la composición debajo de la capa pictórica.

5NF and Database Design

https://kb.databasedesignbook.com/posts/5nf/wikipedia-1.png
The traditional way of teaching fifth normal form (5NF) is confusing and unnecessary, and a more logical approach is to start with business requirements and create a physical table schema using a textbook table design strategy. Two patterns of physical table design follow naturally: the AB-BC-AC triangle and the ABC+D star pattern, both of which are fully normalized and do not require 5NF ...

Turn your best AI prompts into one-click tools in Chrome

https://storage.googleapis.com/gweb-uniblog-publish-prod/images/portrait.max-244x184.format-webp.webp
Chrome introduces Skills, a feature that lets users save and reuse AI prompts with a single click. Saved Skills can be edited and used across multiple tabs for tasks like recipe substitutions and gift selection.

PCBWay sponsorship: full-size SD module for Arduino projects

https://www.colino.net/wordpress/wp-content/uploads/SD-module-scaled.png
The user accepted a sponsorship offer from PCBWay to review their service, having previously used them for the BurgerDisk project and now ordering a full-size SD card module. They found PCBWay's unique features, such as human DFM analysis and engagement with free software/open-source communities, to be justifiable for the slightly higher pricing compared to JLCPCB.

Let's talk space toilets

https://substackcdn.com/image/fetch/$s_!aDF5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93ff87e6-4749-409d-9da4-c5e9a249a84c_2356x1186.png
NASA has been working on space toilets for decades, with early designs being rudimentary and often causing problems for astronauts, but recent advancements have improved the systems, especially for the International Space Station. However, the challenge of designing a reliable and safe toilet for a Mars mission is significant, requiring consideration of factors like radiation, gravity, and ...

The dangers of California's legislation to censor 3D printing

https://www.eff.org/files/banner_library/printer-labels-2.png
California's A.B. 2047 bill will criminalize open-source 3D printer use and impose censorship, hurting innovation and consumer choice. This legislation risks surveillance, platform lock-in, and stifling grassroots creativity, with unintended consequences extending beyond California's borders.

Saying goodbye to Agile

https://lewiscampbell.tech/img/icon512-967261d058848800.png
The Agile industry was defined by what it wasn't, primarily Waterfall, but its core principles were vague and unworkable. Agile innovations were actually developed decades earlier by serious engineers.

Trusted access for the next era of cyber defense

https://images.ctfassets.net/kftzwdyauwt9/6qK652sBXMQa7WpNrExPOT/afcd024e00e2d07bb1132e66881ea53d/axios-dev-tool-compromise-1x1.png?w=3840&q=90&fm=webp
We're scaling up our Trusted Access for Cyber program to help defenders protect critical software and infrastructure. Our approach includes democratized access, iterative deployment, and ecosystem resilience to mitigate cyber risks.

Tell HN: Fiverr left customer files public and searchable

Fiverr uses Cloudinary to process and serve work products, but uses public URLs for sensitive client-worker communication. This exposes hundreds of files containing PII in Google search results, violating GLBA/FTC Safeguards Rule.

Guide.world: A compendium of travel guides

It's surprisingly hard to find good travel writing online. Upon landing someplace, you can peruse Wikipedia, but what else should one read? Below is a compendium of recommended pieces.
https://img.itch.zone/aW1nLzI2NjAxNDY4LnBuZw==/original/uV3UoI.png
Players praise the game's unique art and challenging platforming experience, with some experiencing disorienting effects from the looping visuals. The game's creator is commended for their technical skill and inspiration from Escher and other sources.

I wrote to Flock's privacy contact to opt out of their domestic spying program

User sent opt-out request to Flock Safety due to CCPA, but they refused citing customer ownership of data. User disputes this, believing Flock Safety is responsible for complying with CCPA.

Troubleshooting Email Delivery to Microsoft Users

Microsoft temporarily blocked our emails to Hotmail, Live, MSN, and Outlook users due to a rate limit, but it was later resolved after we implemented a Redis-backed throttler to control our sending rate. The issue was likely caused by a spike in email traffic from our IPs, which Microsoft's algorithms flagged as suspicious, and we are considering warming up an IP solely for transactional ...

Show HN: Plain – The full-stack Python framework designed for humans and agents

https://repository-images.githubusercontent.com/617269166/2711cb6a-6a5f-4df5-a40e-c4f442315afc
The code defines a User model with email, password, display name, admin status, and creation date in a Plain framework application. It also creates a UserDetail view and a UsersRouter to handle user details and URLs in the application.