-
108
Retiring Test-Ipv6.com
(retire.test-ipv6.com)
-
121
The deadline isn't when AI outsmarts us – it's when we stop using our own minds
(theargumentmag.com)
-
26
Show HN: Pyscn – Python code quality analyzer for vibe coders
(github.com)
-
219
Personal data storage is an idea whose time has come
(blog.muni.town)
-
33
86 GB/s bitpacking with ARM SIMD (single thread)
(github.com)
-
17
Experimental and Theoretical Confirmation of Covalent Bonding in α-Pu
(advanced.onlinelibrary.wiley.com)
-
49
I do not want to be a programmer anymore
(mindthenerd.com)
-
37
Self hosting 10TB in S3 on a framework laptop and disks
(jamesoclaire.com)
-
200
What .NET 10 GC Changes Mean for Developers
(roxeem.com)
-
114
Managing context on the Claude Developer Platform
(anthropic.com)
-
146
Beginner Guide to VPS Hetzner and Coolify
(bhargav.dev)
-
131
Ambigr.am
(ambigr.am)
-
296
ProofOfThought: LLM-based reasoning using Z3 theorem proving
(github.com)
-
38
Which Table Format Do LLMs Understand Best?
(improvingagents.com)
-
309
Social Cooling (2017)
(socialcooling.com)
-
4
Remembering Steve Jobs
(macrumors.com)
-
108
Benefits of choosing email over messaging
(spinellis.gr)
-
265
A comparison of Ada and Rust, using solutions to the Advent of Code
(github.com)
-
4
Megafauna was the meat of choice for South American hunters
(arstechnica.com)
-
89
Parrot – type-safe SQL in Gleam, supports SQlite, PostgreSQL and MySQL
(github.com)
-
32
Comparing a RISC and a CISC with Similar Hardware Organization (1991)
(dl.acm.org)
-
12
Hobby Hilbert Simplex
(nedbatchelder.com)
-
70
The best worst hack that saved our bacon
(jeffersonheard.ghost.io)
-
236
Americans increasingly see legal sports betting as a bad thing for society
(pewresearch.org)
-
110
Newton: physics simulation engine built upon NVIDIA Warp
(github.com)
-
202
Blog Feeds
(blogfeeds.net)
-
100
1Password CLI Vulnerability (2023)
(codeberg.org)
-
14
Show HN: 2D Spine Animation AI for Game
(godmodeai.co)
-
70
Space Mission Options for Reconnaissance and Mitigation of Asteroid 2024 YR4
(arxiv.org)
-
180
NSA and IETF: Can an attacker purchase standardization of weakened cryptography?
(blog.cr.yp.to)