JVM Options Explorer

The input specifies options for Java Heap allocation and class loading, including aliasing, prefetching, and locking. It also sets thresholds for using malloc or mmap for memory allocation.

Happy Map

https://pudding.cool/2026/02/happy-map/assets/social-facebook.png
100,000 moments of human happiness, mapped

Why weekends are under threat

https://20627419.fs1.hubspotusercontent-na1.net/hub/20627419/hubfs/Daily%20Newsletter%20Images/Daily%20Images/April%2012%202026/share.png?width=524&height=393&name=share.png
Sign up for The Hustle to get the business world's wildest stories delivered daily. This one's on us. We're committed to your privacy. HubSpot uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our privacy policy. This form is protected ...

Phyphox – Physical Experiments Using a Smartphone

https://phyphox.org/google-play-badge.png
The phyphox team received the Ars legendi-faculty award in 2020 for developing phyphox, an app for academic teaching and physics classes. They also received the teaching award in 2019 from the AG Physikalische Praktika of the German Physical Society.

An Interview with Pat Gelsinger

https://substackcdn.com/image/fetch/$s_!Yj2c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F177709c2-5c41-4eec-af01-159bd6f3cd86_3806x1766.png
Pat Gelsinger, former Intel CEO, now at Playground Global, is evaluating startups and investing in companies that can shape the industry. He believes the future of compute will be heterogeneous, combining classical, AI, and quantum systems.

The Miller Principle (2007)

I had some other principles too but I figured no one would read them…. :)

Anthropic downgraded cache TTL on March 6th

https://opengraph.githubassets.com/fadd0bbfe0c7c5970ce61c98d8c7fbed972a567f879d4e10f00070b4863b62c4/anthropics/claude-code/issues/46829
Anthropic silently changed Claude Code's prompt cache TTL default from 1 hour to 5 minutes in early March 2026. This caused a 20-32% increase in cache creation costs and quota consumption for subscription users.

AI Will Be Met with Violence, and Nothing Good Will Come of It

https://substackcdn.com/image/fetch/$s_!eC5c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768f3fea-f270-45f0-ba62-4febc9c32bc2_1344x896.png
People are increasingly frustrated with the impact of technology, particularly AI, on their lives and are turning to violence against those associated with it. This is a result of feeling desperate and powerless against the effects of technological advancements.

Tofolli gates are all you need

https://www.johndcook.com/jdc_20170630.jpg
Landauer's principle sets a lower bound on erasing one bit of information, but reversible circuits can still provide practical efficiency gains. Reversible circuits like the Toffoli gate can be used to compute any Boolean function, including NAND, but may require more input and output.

I run multiple $10K MRR companies on a $20/month tech stack

https://stevehanov.ca/blog/images/95f16b3dbf861a9156cb2c6d1be39f5e2fcfc1b1f4c5f11ee6f9e182bd4c5f5a.png
The author, a successful bootstrapper, shares their playbook for running a lean startup with minimal costs. They use a single VPS, statically compiled binaries, and local GPU hardware for AI tasks.

What have been the greatest intellectual achievements? (2017)

User discusses Claude Shannon and the need to highlight influential intellectual achievements in obscure fields, particularly in humanities and social sciences. They list several foundational achievements in physics, mathematics, and probability theory, and mention areas with potential for future influence.

Apple update looks like Czech mate for locked-out iPhone user

https://regmedia.co.uk/2024/03/27/passcode_shutterstock.jpg
A US university student is locked out of his iPhone 13 after Apple removed a character from the Czech keyboard in an iOS update. He hopes for a fix in the next update, but may have to restore his device and lose valuable photos.

How We Broke Top AI Agent Benchmarks: And What Comes Next

https://rdi.berkeley.edu/blog/trustworthy-benchmarks-cont/figures/terminal-bench-exploit.svg
An automated scanning agent discovered vulnerabilities in eight prominent AI benchmarks, allowing near-perfect scores without solving tasks. The Agent-Eval Checklist provides a minimum bar for robust evaluation, including isolating agents from evaluators and preventing tampering with evaluation data.

Stewart Brand on how progress happens

https://media.newyorker.com/photos/69822e6d58602f75b417b461/master/w_1600%2Cc_limit/Winchester_Perfectionists.jpg
Stewart Brand's new book "Maintenance: Of Everything" celebrates learning and fixing things, arguing maintenance drives technological progress. The book draws on historical examples like interchangeable parts and the Industrial Revolution to make its point.

Internet outage in Iran reaches 1,008 hours

https://files.mastodon.social/site_uploads/files/000/000/001/@1x/57c12f441d083cde.png
Attached: 1 image 🗓️ Exactly six weeks ago on Saturday 28 February, #Iran fell victim to a regime-imposed internet blackout that remains in place after 1008 hours, now entering day 43. The censorship measure's harms grow daily, damaging livelihoods and violating Iranians' digital and human rights.

No one owes you supply-chain security

https://purplesyringa.moe/blog/no-one-owes-you-supply-chain-security/og.png
The user, an autistic catgirl, argues that supply-chain attacks on crates.io are not solely the responsibility of the registry, but rather of users who must audit the crates they use. They provide suggestions for users to secure their dependencies, including lockfiles, cargo-vet, and sandboxing tools like cargo-chef and firejail.

Small models also found the vulnerabilities that Mythos found

https://aisle.com/_next/image?url=https%3A%2F%2Faisle.com%2Fapi%2Fmedia%2Ffile%2Ffreepik_create-this_2743478282.webp%3F2026-04-08T16%3A00%3A02.637Z&w=3840&q=100
Anthropic's Mythos AI model is not the only solution for AI cybersecurity as smaller, cheaper models can recover similar analysis and detect vulnerabilities. The capability of AI cybersecurity is jagged and doesn't scale smoothly with model size, with the system and security expertise being more important than the model itself.

How Complex is my Code?

https://philodev.one/images/2026-04-complexity-cyclomatic.png
Measuring code complexity for humans is challenging as it involves understanding the mental effort required to comprehend the code, which can be influenced by factors such as familiarity with patterns, working memory load, and coherence. Various metrics like Cyclomatic Complexity, Halstead Complexity, and linguistic complexity measures can provide insights, but ultimately, the cognitive ...

447 TB/cm² at zero retention energy – atomic-scale memory on fluorographane

Access to this resource has been blocked due to unusual traffic from your network. If you believe this is a mistake, please contact [email protected] with the reference information below.

Dark Castle

https://darkcastle.co.uk/assets/images/head-1-396x418.png
Return To Dark Castle is a 2008 Macintosh platform game with 63 levels, including 50 new ones. The game follows Bryant as he fights to defeat the Black Knight and rescue Duncan, the original hero.

Pijul a FOSS distributed version control system

Pijul is a free, open-source version control system based on a theory of patches, offering simplicity and scalability. It preserves order and guarantees strong merge properties, modeling conflicts as standard cases.

Relics of the Heroic Age of Manned Space Flight

The unused Saturn/Apollo hardware was distributed to various museums around the country, “relics of the heroic age of manned space flight.”

Apple Silicon and Virtual Machines: Beating the 2 VM Limit (2023)

https://khronokernel.com/images/posts/2023-08-08-AS-VM/UTM-Max-VM-Limit.png
You worked as a Mac Admin Intern and researched Apple Silicon Virtual Machines limitations. You found the limitation is implemented in the closed-source XNU kernel, not userspace, and can be overridden by setting hv_apple_isa_vm_quota in the kernel.

The End of Eleventy

https://brennan.day/assets/images/blog/11ty.jpg
The Font Awesome team has launched a Kickstarter for Build Awesome, a rebranded version of the static site generator 11ty, which has already reached its funding goal, but many 11ty developers are concerned about the project's direction and potential impact on the open-source community. The rebranding effort has been met with skepticism, with some developers questioning the need for a paid ...

Cirrus Labs to join OpenAI

Cirrus Labs joined OpenAI to build tooling for agentic engineers, extending its mission of making engineers more effective. Cirrus Labs will relicense its tools under a permissive license and stop charging licensing fees.

Advanced Mac Substitute is an API-level reimplementation of 1980s-era Mac OS

https://www.v68k.org/advanced-mac-substitute/pix/macpaint/hello.png
Advanced Mac Substitute is an API-level reimplementation of 1980s-era Mac OS that runs 68K Mac applications in an emulator. It launches directly into an application without a startup phase on POSIX-like systems.

Show HN: Pardonned.com – A searchable database of US Pardons

User created pardonned.com to verify claims and easily access pardons data, using Playwright, SQLite, and Astro. They plan to extend the site with analysis and comparison tools to break down pardon composition by President and visualize changes in pardon numbers.

Network Flow Algorithms

https://www.networkflowalgs.com/img/baseball.png
Network flow theory is applied in various fields to model transportation, image segmentation, and other problems. This graduate text presents efficient combinatorial algorithms for network flow problems, including maximum and minimum-cost flows.

Surelock: Deadlock-Free Mutexes for Rust

https://notes.brooklynzelenka.com/Blog/tears-in-rain.jpg
The user created a library called surelock to prevent deadlocks in Rust by using a linear scope token called MutexKey that threads through every acquisition and provides a compile-time witness of the current lock state. The library uses a physical-world analogy where the MutexKey is like a key that is consumed and re-emitted at each lock acquisition, and it also supports incremental ...

Doom, Played over Curl

https://raw.githubusercontent.com/xsawyerx/curl-doom/main/images/curl-bash-tiny.gif
HTTP server rendering DOOM frames into ANSI half-blocks, streamed to the terminal over HTTP with cURL. GET / is content-negotiated: a curl gets back play.sh with __SERVER__ rewritten to whichever host you fetched it from. The script runs the per-keystroke /tick loop, handles stty, the alternate screen, the cursor, and cleanup. A browser hitting the same URL gets a tiny landing page that just ...