All it takes is for one to work out

https://alearningaday.blog/wp-content/uploads/2014/05/bnw.jpg
Applicant faced uncertainty and self-doubt during graduate school applications due to low GPA and GMAT score. A supportive person's words helped applicant persevere and eventually secure admission.

Be Like Clippy

https://be-clippy.com/clippys/clippy.png
The Be Like Clippy movement aims to make companies more transparent and user-friendly by embracing open data practices. It encourages developers and users to opt-in for data collection instead of being forced to use exploitative services.

Learning Feynman's Trick for Integrals

A few tricks and techniques can be useful when evaluating integrals. one such trick is to parameterise the integral so that it simplifies some parts of it, says stefan krueger jr. another useful integral is: you can differentiate either (a)) or '(b) if you want to rewrite the logarithm as an integral, he adds. for further

Post-mortem of Shai-Hulud attack on November 24th, 2025

https://res.cloudinary.com/dmukukwp6/image/upload/c_scale,w_1401/keyboard_garden_light_opt_compressed_5094746caf
PostHog's SDKs and packages were compromised by a malicious worm called Shai-Hulud 2.0, which was published to npm on November 24th and affected only JavaScript SDKs. The attack was carried out by stealing PostHog's GitHub secrets and using them to publish the malicious packages, and the company has since taken steps to improve its security posture and prevent similar incidents.

Show HN: Nano PDF – A CLI Tool to Edit PDFs with Gemini's Nano Banana

https://raw.githubusercontent.com/gavrielc/Nano-PDF/main/assets/Nano%20PDF.png
Nano PDF is a CLI tool that edits PDF slides using natural language prompts powered by Google's Gemini 3 Pro Image model. It requires a paid Google API key and can process multiple pages in parallel with configurable resolution.

Landlock-Ing Linux

Landlock is a Linux API that allows applications to declare allowed resources and restrict access to everything else. It provides a simple, developer-friendly way to add defense-in-depth to applications with transient restrictions.

Zero knowlege proof of compositeness

https://www.johndcook.com/jdc_20170630.jpg
A zero knowledge proof (ZKP) proves a statement without revealing the underlying information. ZKP can be used to prove a number is composite without revealing its factors.

The Origins of Scala (2009)

Martin Odersky, Scala's creator, started programming at age 20 with a Sinclair ZX 80 and later worked on a Modula-2 compiler. He became a professor and researched functional programming, leading to the development of Pizza and GJ, which influenced Java generics.

Men Who Made America's Self-Made Man

https://s3.amazonaws.com/cdn.historynewsnetwork.org/sites/default/files/lead_images/186075-NPG-NPG_2023_75_precon.jpg
The concept of the "self-made man" emerged in the US in the early 19th century as a way to praise individuals who rose to power through their own efforts, rather than through aristocratic connections. This myth was initially used to promote politicians like Andrew Jackson, but it eventually spread to include wealthy business leaders, becoming a powerful cultural and rhetorical tool for ...

An update on the Farphone's battery

earlier this week i shared the how-to for this website, which is running on an old smartphone folks on lobste.rs and hacker news pointed out the fire risk of keeping a lithium battery plugged in all the time the fairphone 2 being as modular as it is, it was trivial to open the phone, pop the battery out, and duct-tape the micro-usb charging cable to the phone to avoid accidental dos

Europe's New War on Privacy

https://unherd.com/wp-content/themes/UH2023/src/img/xstandalone.png
The EU's Chat Control plan, aimed at detecting child abuse, has been reworked to avoid public resistance, but critics argue it still poses significant risks to privacy and fundamental rights. The revised plan allows for voluntary mass scanning and mandatory age-verification systems, which could lead to widespread surveillance and undermine online anonymity.

Rare X-ray images of a 4.5-ton satellite that returned intact from space

https://www.empa.ch/documents/56164/33231150/EQ89-Eureca-stopper.jpg/05d8c3ae-f68e-931b-18fd-6ab35d614cc4?t=1760447138352
Empa researchers studied the European satellite EURECA using non-destructive X-ray methods to identify weak points in reusable space technologies. The analysis could help optimize satellite design and reduce space junk, with potential applications in aviation and automotive industries.

Show HN: Network Monitor – a GUI to spot anomalous connections on your Linux

The tool is a Rust-based network connection monitor with a GTK4 interface, displaying live I/O statistics. It uses ss output, which may be brittle due to format changes.

Electric vehicle sales are booming in South America – without Tesla

Please enable JS and disable any ad blocker

Hardening the C++ Standard Library at scale

The website is temporarily blocked due to security reasons after a suspicious action was detected. Please email the site owner with the Cloudflare Ray ID to report the issue.

The CRDT Dictionary: A Field Guide to Conflict-Free Replicated Data Types

The user is looking for a refresher on Conflict-free Replicated Data Types (CRDTs) and wants to know which CRDT to use in different scenarios, including counting, sets, sequences, and garbage collection. The user is also looking for a guide to help cut through the overwhelming literature on CRDTs and provide intuition on how merges work, as well as a list of key papers and tradeoffs to ...

AccessOwl (YC S22) Is Hiring a Technical Account Manager (IAM)

https://bookface-images.s3.amazonaws.com/small_logos/1f47d40efa2ec60ceb6de3d5dad85ab504f1c80f.png
AccessOwl is hiring a technical account manager to work with IT and security teams at fast-growing companies, implementing and optimizing their AI native Access Governance Suite. The ideal candidate has 3+ years of IT experience, strong communication skills, and a builder mindset, with experience in automation tools and SaaS ecosystems.

Bronze Age mega-settlement in Kazakhstan has advanced urban planning, metallurgy

https://archaeologymag.com/wp-content/uploads/bronze-age-settlement-kazakhstan-1.jpg
Archaeologists in Kazakhstan discovered a 140-hectare Bronze Age settlement, Semiyarka, which challenges previous views on steppe settlements. The site features a planned urban landscape, industrial zone, and complex architecture, indicating a sophisticated society with regional influence.

Hachi: An Image Search Engine

https://eagledot.xyz/assets/face_rec_1.png
The user is developing a self-hosted search engine that can handle personal data across various devices and platforms, with a focus on end-to-end encryption and user authentication. The project aims to provide a flexible and hackable interface for searching and querying personal data, using a combination of traditional and machine learning-based attributes.

Blender facial animation tool. What else should it do?

https://raw.githubusercontent.com/wiki/shun126/livelinkface_arkit_receiver/livelinkface_arkit_receiver.gif
LiveLinkFace ARKit Receiver is a Blender add-on that receives facial tracking data sent from the Live Link Face app on iPhone and automatically applies it to Shape Keys in Blender. 🎨 A simple tool that allows artists to animate their models using their own facial expressions. Download the file Open Blender and drag and drop the downloaded .zip file into Blender. In the settings screen, enter ...

DNS LOC Record (2014)

https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7lCDvfhTzFcVMB5PveKJco/9283bc24e4a11eddef1aa631a61960e9/the-weird-and-wonderful-world-of-dns-loc-records.jpg
CloudFlare's RRDNS serves DNS requests quickly and handles attacks. It recently fixed a LOC record parsing issue, allowing 743 records to be served correctly.

Framework Computer Now Sponsoring LVFS / Fwupd Development

https://www.phoronix.com/assets/categories/hardware.webp
Phoronix.com celebrates 21+ years of Linux reviews and news with 5,500 reviews and 48,400 articles. Framework Computer becomes the first sponsor of the Linux Vendor Firmware Service (LVFS) with an annual dues of around $10k USD.

Baboon: Data Modeling with Automatic Evolutions and tagless binary codecs

https://opengraph.githubassets.com/16da5316d22b773669b9c2624590f3c9e42f1b32ee221ca2717fbbbf3ab6c24a/7mind/baboon
Baboon is a minimal Data Modeling Language and compiler that provides ergonomic, declarative schemas and enforces reliable schema evolution. The compiler runs as a fast immutable multi-phase DAG transform, and is easy to understand and maintain. Automatic codec derivation for JSON and UEBA (Ultra-Efficient Binary Aggregate, a custom tagless binary format) (*) This is a DML, not an IDL, ...

Joe Armstrong interviews Alan Kay (2016) [video]

Anthony Bourdain's Lost Li.st's

https://github-production-user-asset-6210df.s3.amazonaws.com/1017304/519033609-62aaebdd-6531-4e1f-9b37-c69b9d5cc521.png?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAVCODYLSA53PQK4ZA%2F20251129%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20251129T092943Z&X-Amz-Expires=300&X-Amz-Signature=13541626bdc0180b872b6c1222016319aa38e3eaaf77ec599d92387f790aed5b&X-Amz-SignedHeaders=host
Anthony Bourdain shares his opinions on various topics including food, movies, and travel destinations.

Iceland declares ocean-current instability a national security risk

https://media.cnn.com/api/v1/images/stellar/prod/gettyimages-2201582241.jpg?c=original&q=w_1041,c_fill
Iceland's government has designated the potential collapse of the Atlantic Meridional Overturning Circulation as a national security threat due to its catastrophic impacts on climate and economy. The collapse could lead to huge global weather shifts, rising sea levels, and disrupted monsoon systems, posing an existential threat to Iceland's infrastructure and industries.

Plinko PIR Tutorial

Private information retrieval (PIR) protocols allow clients to query a database without revealing their query to the server, and Plinko is a PIR protocol that efficiently achieves this with O(sqrt(N)) communication overhead and server-side compute costs. Plinko uses a preprocessing strategy to remove the trust assumption and can be used to query large datasets, such as Ethereum's state tree, ...

Building road signs at home using a Cricut Machine

https://annanay.dev/images/build-a-signboard/cricut_in_action.png
User made a signboard using a Cricut Maker 2 and vinyl, cutting and transferring the design onto aluminum and Plexiglass bases. A cold roll laminator helped achieve a smooth finish by preventing air bubbles.

WebR – R in the Browser

https://webr.sh/assets/banner.png
Interactive R environment running in your browser. Execute R code, create plots, and analyze data without installing anything.

Major AI conference flooded with peer reviews written by AI

https://media.nature.com/lw767/magazine-assets/d41586-025-03506-6/d41586-025-03506-6_51767010.jpg
Researchers suspected AI-generated peer reviews at ICLR 2026, citing hallucinated citations and vague feedback. Pangram Labs analyzed submissions and found 21% of peer reviews were fully AI-generated and 9% of manuscripts contained over 50% AI-generated text.