- 111New iMac with M4 (apple.com)
- 114How Gothic Architecture Became Spooky (architecturaldigest.com)
- 10The sins of the 90s: Questioning a puzzling claim about mass surveillance (blog.cr.yp.to)
- 201Using Rust in Non-Rust Servers to Improve Performance (github.com)
- 289Ask HN: What Are You Working On? (October 2024)
ask - 20Psychological Safety vs. High Standards: A Misunderstood Dynamic (leadingsapiens.com)
- 104Mill: A fast JVM build tool for Java and Scala (mill-build.org)
- 293NewPipe on Linux, Using Android_translation_layer (flathub.org)
- 407A Chopin waltz unearthed after nearly 200 years (nytimes.com)
- 349You-get: Dumb downloader that scrapes the web (github.com)
- 9State-space models can learn in-context by gradient descent (arxiv.org)
- 414Character amnesia in China (globalchinapulse.net)
- 138Hoard of coins from Norman Conquest is Britain's most valuable treasure find (cnn.com)
- 165418 I’m a teapot (developer.mozilla.org)
- 16GoLic, injects license into source code files (github.com)
- 48The Use of Knowledge in Society (1945) [pdf] (kysq.org)
- 315Crossing the USA by Train (blinry.org)
- 130Optimizers need a rethink (typesanitizer.com)
- 45Show HN: Finstruments - Financial instrument library built with Python (github.com)
- 92Becoming physically immune to brute-force attacks (2021) (seirdy.one)
- 26Nested Loops Revisited Again (2023) (ieeexplore.ieee.org)
- 88For the strongest disc golf throws, it's all in the thumbs (arstechnica.com)
- 68Cheap Light Transformed Civilization (bigthink.com)
- 28Apple Intelligence is available today on iPhone, iPad, and Mac (apple.com)
- 201Write code that is easy to delete, not easy to extend (2016) (programmingisterrible.com)
- 35Room temp chirality switching and detection in a helimagnetic MnAu2 thin film (nature.com)
- 19The Event Horizon Telescope image might need a correction (academic.oup.com)
- 65The Coming Technological Singularity (1993) (mindstalk.net)
- 104SDL-based Lua programming environment for kids similar to Codea (github.com)
- 57Practical Introduction to BLE GATT Reverse Engineering: Hacking the Domyos EL500 (2023) (jcjc-dev.com)