-
How to Write Unmaintainable Code (1999)
-
Why your joints make noise
-
Iran strikes leave Amazon availability zones "hard down" in Bahrain and Dubai
-
Qwen3.6-Plus: Towards real world agents
-
Mercor says it was hit by cyberattack tied to compromise LiteLLM
-
Tailscale's new macOS home
-
Show HN: DocMason – Agent Knowledge Base for local complex office files
-
'Backrooms' and the Rise of the Institutional Gothic
-
A new gene therapy is giving people born deaf the chance to hear
-
Steam on Linux Use Skyrocketed Above 5% in March
-
Maze Algorithms (1997)
-
Cursor 3
-
Good ideas do not need lots of lies in order to gain public acceptance (2008)
-
A case study in testing with 100+ Claude agents in parallel
-
Bringing Clojure programming to Enterprise (2021)
-
Csp-toolkit – Python library to parse, analyze, and find bypasses in CSP headers
-
SSH certificates: the better SSH experience
-
Async Python Is Secretly Deterministic
-
Remembering Magnetic Memories and the Apollo AGC
-
Show HN: Dev Personality Test
-
Show HN: ctx – an Agentic Development Environment (ADE)
-
Sequential Optimal Packing for PCB Placement
-
How to make a sliding, self-locking, and predator-proof chicken coop door (2020)
-
Show HN: Ownscribe – local meeting transcription, summarization and search
-
Artemis II's toilet is a moon mission milestone
-
AGI won't automate most jobs–because they're not worth the trouble
-
I Built an SMS Gateway with a $20 Android Phone – Jonno.nz
-
Firm boosts H.264 streaming license fees from $100k up to staggering $4.5M
-
Show HN: Travel Hacking Toolkit – Points search and trip planning with AI
-
The Axios supply chain attack used individually targeted social engineering
More