- 40The long road to lazy preemption in the Linux CPU scheduler (lwn.net)
- 65A Simple open-source Phone programmable with Arduino (wiphone.io)
- 263New Mersenne Prime discovered (probably) (mersenne.org)
- 697Secret 3D scans in the French Supreme Court (cosmowenman.substack.com)
- 274Show HN: Go Plan9 Memo (pehringer.info)
- 37Show HN: How to leverage Claude's capabilities with interactive visualization (github.com)
- 34PhotoDNA (en.wikipedia.org)
- 269Code that helped end Apartheid (wired.com)
- 244JSON Patch (zuplo.com)
- 9Ask HN: How do you organize your electronic components?
ask - 16Cross-Process Spectre Exploitation (grsecurity.net)
- 10Taming randomness in ML models with hypothesis testing and marimo (blog.mozilla.ai)
- 207Running an open source app: Usage, costs and community donations (spliit.app)
- 157Focus on decisions, not tasks (technicalwriting.dev)
- 52Doctor Fukushi Masaichi and the art of preserving tattooed skin (dannydutch.com)
- 166setBigTimeout (evanhahn.com)
- 65Steve's Jujutsu Tutorial (steveklabnik.github.io)
- 334Using static websites for tiny archives (alexwlchan.net)
- 99Why conventional wisdom on health care is wrong (a primer) (2020) (randomcriticalanalysis.com)
- 101Where the Digital Sidewalk Ends (smolways.com)
- 449The feds are coming for John Deere over the right to repair (gizmodo.com)
- 102The Making of Micro Machines (readonlymemory.com)
- 25Teaching old assert() new Tricks (blog.ngs-lang.org)
- 163Ask HN: Founders, what was the major sourcing channel for your first 100 users?
ask - 11Compiling Bigloo Scheme to WebAssembly (blogs.igalia.com)
- 103One of Florida's most lethal python hunters (gardenandgun.com)
- 167My solar-powered and self-hosted website (dri.es)
- 188Subvert – Collectively owned music marketplace (subvert.fm)
- 370Apple Passwords’ generated strong password format (rmondello.com)
- 244Hacker Typer (hackertyper.net)