- 168Simple trick to increase coverage: Lying to users about signal strength (nickvsnetworking.com)
- 403Facts about throwing good parties (atvbt.com)
- 40Oxy is Cloudflare's Rust-based next generation proxy framework (2023) (blog.cloudflare.com)
- 233Paris had a moving sidewalk in 1900, and a Thomas Edison film captured it (2020) (openculture.com)
- 257Using FreeBSD to make self-hosting fun again (jsteuernagel.de)
- 27When models manipulate manifolds: The geometry of a counting task (transformer-circuits.pub)
- 111Alleged Jabber Zeus Coder 'MrICQ' in U.S. Custody (krebsonsecurity.com)
- 208Why don't you use dependent types? (lawrencecpaulson.github.io)
- 276Tongyi DeepResearch – open-source 30B MoE Model that rivals OpenAI DeepResearch (tongyi-agent.github.io)
- 13Syllabi – Open-source agentic AI with tools, RAG, and multi-channel deploy (syllabi-ai.com)
- 55How the Mayans were able to accurately predict solar eclipses for centuries (phys.org)
- 147Lisp: Notes on its Past and Future (1980) (www-formal.stanford.edu)
- 369URLs are state containers (alfy.blog)
- 61Why does Swiss cheese have holes? (usdairy.com)
- 106Reproducing the AWS Outage Race Condition with a Model Checker (wyounas.github.io)
- 155X.org Security Advisory: multiple security issues X.Org X server and Xwayland (lists.x.org)
- 16Collatz-Weyl Generators: Pseudorandom Number Generators (2023) (arxiv.org)
- 9Terahertz Tech Sets Stage for "Wireless Wired" Chips (spectrum.ieee.org)
- 29I ****Ing Hate Science (2021) (buttondown.com)
- 317Notes by djb on using Fil-C (cr.yp.to)
- 24Underdetermined Weaving with Machines (2021) [video] (youtube.com)
- FurtherAI (Series A – A16Z, YC) Is Hiring Across Software and AI
job - 90Is Your Bluetooth Chip Leaking Secrets via RF Signals? (semanticscholar.org)
- 19New Prompt Injection Papers: Agents Rule of Two and the Attacker Moves Second (simonwillison.net)
- 40Solar-powered QR reading postboxes being rolled out across UK (bbc.co.uk)
- 121Autodesk's John Walker Explained HP and IBM in 1991 (2015) (cringely.com)
- 305Backpropagation is a leaky abstraction (2016) (karpathy.medium.com)
- 277Anti-cybercrime laws are being weaponized to repress journalism (cjr.org)
- 68The x86 Interrupt List, aka “Ralf Brown's Interrupt List” (2018) (cs.cmu.edu)
- 100Writing FreeDOS Programs in C (freedos.org)