The rise of industrial software

https://chrisloy.dev/images/2025/industry-1.svg
The industrialization of software production is making it cheaper, faster, and more automated, but this may lead to a surge in low-quality, disposable software. This trend could result in an explosion of software output, similar to the impact of smartphones on photo, video, and audio capture.

Show HN: Use Claude Code to Query 600 GB Indexes over Hacker News, ArXiv, etc.

https://exopriors.com/logo.jpeg
You have public access to the ExoPriors alignment research corpus with a provided API key. You can query 60M documents using SQL and store named embeddings for semantic search.

Animated AI

https://animatedai.github.io/media/pixel-shuffle-2x2-shuffle.gif
You create animations and instructional videos about neural networks, promoting your Patreon and YouTube channel. Your videos cover convolution fundamentals, padding, stride, groups, depthwise, and pixel shuffle techniques.

A faster heart for F-Droid

https://f-droid.org/assets/fdroid-logo_bfHl7nsLHOUQxzdU8-rGIhn4bAgl6z7k2mA3fWoCyT4=.png
F-Droid replaced its 12-year-old server with new hardware thanks to community donations. The upgrade improved performance, allowing for faster app builds and updates, benefiting the entire repository.

Tixl: Open-source realtime motion graphics

https://user-images.githubusercontent.com/1732545/173256422-a4ef9894-d954-4bc3-8c24-000bfbe1c3ad.png
TiXL is an open source software for real-time motion graphics combining procedural content generation, keyframe animation, and rendering. It aims to balance usability and flexibility, with a community-driven development process.

Readings in Database Systems (5th Edition)

A Biased Take on a Moving Target: Complex Analytics by Michael Stonebraker [HTML] [PDF] A Biased Take on a Moving Target: Data Integration by Michael Stonebraker [HTML] [PDF] This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Show HN: 22 GB of Hacker News in SQLite

FediMeteo: A €4 FreeBSD VPS Became a Global Weather Service

https://images.unsplash.com/photo-1584267385494-9fdd9a71ad75?ixlib=rb-4.1.0&q=85&fm=jpg&crop=entropy&cs=srgb&dl=noaa-ZVhm6rEKEX8-unsplash.jpg&w=640
The user created FediMeteo, a weather forecasting service on the Fediverse, using FreeBSD jails, snac, and Open-Meteo API. The service now supports 38 countries and has 7,707 direct followers, demonstrating a simple and efficient solution to online presence without relying on third-party services.

'Three norths' alignment about to end

https://www.spatialsource.com.au/wp-content/uploads/2025/12/bgs-three-norths-calculation3_625x442.jpg?w=473
A rare 'three norths' alignment in Great Britain has ended after moving 576 km in 1127 days. It will likely not be seen again for several centuries due to the unpredictable magnetic field.

Odin: Moving Towards a New "core:OS"

https://odin-lang.org/images/logo-slim.png
Odin's core:os package is being redesigned for better cross-platform behavior and consistency. A transition to the new design is expected in Q1 2026, with numerous breaking changes and a new API that requires explicit allocators and returns os.Error.

Honey's Dieselgate: Detecting and tricking testers

Honey browser shopping plug-in breaks affiliate marketing rules by ignoring stand-down rules when users have sufficient points or affiliate industry cookies. This behavior is revealed through source code analysis, telemetry, and hands-on testing, showing Honey's intent to evade testers and maintain its affiliate link presentation.

A Vulnerability in Libsodium

Libsodium's goal is to expose simple APIs for cryptography operations, not low-level functions. A recent bug in libsodium's crypto_core_ed25519_is_valid_point function has been fixed, affecting users of versions prior to 1.0.20.

Loss32: Let's Build a Win32/Linux

https://loss32.org/screenshot.png
The loss32 project aims to create a free and open-source OS with a Win32 desktop environment running under WINE, combining the Linux kernel with ReactOS userland components. It seeks to improve WINE's usability and stability for power users and creative users.

OpenAI's cash burn will be one of the big bubble questions of 2026

Private markets continued to invest heavily in startups in 2025, with $150bn poured into firms like Open and Anthropic. This confidence may lead Open to raise up to $100bn from private investors in 2026.

Electrolysis can solve one of our biggest contamination problems

https://ethz.ch/en/news-and-events/eth-news/news/2025/11/electrolysis-can-solve-one-of-our-biggest-contamination-problems/_jcr_content/articleLeadImage/image.imageformat.carousel.1046845309.png
ETH Zurich researchers developed an electrochemical process to render environmental toxins like DDT and lindane harmless and convert them into valuable chemicals. The method uses cheap equipment and can be used on contaminated landfills, soils, or sludge, promoting a sustainable circular economy.

Zpdf: PDF text extraction in Zig

https://opengraph.githubassets.com/d3af1535d6ffc11760e8f87da420c5a7bf069a1ca58f06c70e32c0dd351ea008/Lulzx/zpdf
MuPDF's zpdf library extracts text from PDFs, with single-threaded text extraction and parallelized page extraction. It provides commands for extracting text, showing document info, and running benchmarks.

Non-Zero-Sum Games

https://nonzerosum.games/Images/Content/NPC_Graph.png
Non-Zero-Sum James explores win-win games for a better future through game theory, moral philosophy, and AI. He connects complex problems through non-zero-sum games in categories like ethics and economics.

Sabotaging Bitcoin

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLuEKuTedWVPAfcZekV41yujs5GpyD39hDxp4s-xPD-OV0oTzZR5PS6gdRMYgrW1ynNaMOvt_t-hE0fWNwNxNRNj8lrkG6qXnyFE_scYmNVk3G5h9twYzfiEkRv27wtkXIoPRvlz1BBGnJ6bYpeUnIvN2JWaaVTjdeb5AnVdD9tc9OAZn2eHhBsIGWMN8c/w200-h101/PaperHeading.png
The author defends Bitcoin from critics by analyzing a potential attack on the cryptocurrency using derivatives, but concludes that the attack is unlikely due to significant difficulties in obtaining and maintaining the necessary resources. The attack would require a large short position in Bitcoin, which is difficult to establish and maintain, and the author estimates that the costs of the ...

No strcpy either

https://daniel.haxx.se/blog/wp-content/uploads/2025/10/sourcecode.jpg
We replaced strncpy and strcpy in curl source code with a safer string copy function that takes buffer size and source length as arguments. This change prevents potential buffer overflow issues and reduces false vulnerability claims from AI chatbots.

Toro: Deploy Applications as Unikernels

https://raw.githubusercontent.com/wiki/torokernel/torokernel/images/helloworld.gif
Toro is a unikernel for deploying microservices as microVMs with a minimalistic architecture. It can be tried with the HelloWorld example using a Docker image and commands like wget and python3.

Mitsubishi Diatone D-160 (1985)

https://audio-database.com/MITSUBISHI-DIATONE/diatonesp/d-160.JPG
A Diatone woofer system from 1980 uses a 160 cm cone type woofer with a honeycomb diaphragm and field coil for weight reduction. The system was tested at the Koriyama Factory and caused damage to the neighborhood due to its powerful sound and vibration.

Google Opal

https://opal.google/images/share-card-prod.png

Escaping containment: A security analysis of FreeBSD jails [video]

https://static.media.ccc.de/media/congress/2025/1975-1632d233-fb88-5f58-aaec-823ea32f8b56_preview.jpg
Researchers audited FreeBSD's jail mechanism, finding 50 vulnerabilities that could allow an attacker to break out. They developed proof-of-concept exploits to demonstrate these vulnerabilities and are working with the FreeBSD team to fix them.

Times New American: A Tale of Two Fonts

https://static.hsu.cy/blog/2025/2826e5fc02cb3a35ba040dce9a8b8c4f.jpg
The US State Department switched back to 14-point Times New Roman after a Biden-era directive to 15-point Calibri, citing professionalism and tradition. However, design experts argue that Times New Roman lacks authority and is often used due to inertia rather than aesthetic excellence.

The British empire's resilient subsea telegraph network

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxdPUjhIYaHDXjA8B4dWPTlz5TKHwnpqte-GoEjTBvZWTPhBx3_qHDi_3mIXODUB1G8M0iHBNA4B5PMBkSLJOVTfrHbVSrSe8eb6YGiHyPymziABkD9cWnf4ADsVuAFCo9gNXXcrNB4OViNqouOdMCBdLFFqhoOqe6ze6wvcLcwQpD9gvqbZF_UgP6-qk/w640-h378/1902AllRedLineMap.jpg
The British Empire's Red Line cable network was highly resilient with a ring configuration and multiple cables between end points, making it difficult to disrupt. Starlink's satellites have shorter than expected life spans, which may hit its income statement hard due to increased network depreciation and replacement needs.

Five Years of Tinygrad

The company tinygrad has been working on a sovereign software stack for AI since October 2020, with a team of 6 people and a codebase of 18,935 lines. It aims to compete with NVIDIA by focusing on software, not hardware, and has made significant progress in outperforming PyTorch on many workloads.

LLVM AI tool policy: human in the loop

https://us1.discourse-cdn.com/flex021/uploads/llvm/original/1X/6ac54669f4b30cb07094375cbd65d24163b5b6e0.jpeg
LLVM's new AI contribution policy requires a human in the loop to review and understand LLM-generated code or text before submitting it. Contributors must be accountable for their work and transparent about tool usage to ensure maintainers' time is valued and not wasted.

Professional software developers don't vibe, they control

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
Experienced developers value AI agents for productivity but retain control over software quality. They use agents effectively by controlling behavior and complementing their limitations with expertise.

Approachable Swift Concurrency

Swift's concurrency model uses async/await, Tasks, and actors to handle waiting and organize code. Isolation domains protect data, and the Sendable protocol ensures safe data sharing between domains, making concurrency safer and easier to reason about.

L1TF Reloaded

https://raw.githubusercontent.com/ThijsRay/l1tf_reloaded/main/.github/thumbnail.png
Researchers found a way to exploit L1TF and Spectre vulnerabilities to leak data from virtual machines and hosts. They recommend deploying additional mitigations to prevent this attack.