- 141How OpenAI delivers low-latency voice AI at scale (openai.com)
- 323I am worried about Bun (wwj.dev)
- 986Talking to strangers at the gym (thienantran.com)
- 70Formatting a 25M-line codebase overnight (stripe.dev)
- 138Securing a DoD contractor: Finding a multi-tenant authorization vulnerability (strix.ai)
- 594GameStop makes $55.5B takeover offer for eBay (bbc.co.uk)
- 308Microsoft Edge stores all passwords in memory in clear text, even when unused (twitter.com)
- 164Does Employment Slow Cognitive Decline? Evidence from Labor Market Shocks (nber.org)
- 197Redis array: short story of a long development process (antirez.com)
- 10Pulitzer Prize Winners 2026 (pulitzer.org)
- 94Let's talk about LLMs (b-list.org)
- 211How Monero’s proof of work works (blog.alcazarsec.com)
- 144UK Fuel Price Intelligence – Market analytics from reporting stations (fuelinsight.co.uk)
- 366US healthcare marketplaces shared citizenship and race data with ad tech giants (techcrunch.com)
- 6Testing macOS on the Apple Network Server 2.0 ROMs (oldvcr.blogspot.com)
- 89Pomiferous: The most extensive apples (pommes) database (pomiferous.com)
- 851966 Ford Mustang Converted into a Tesla with Working 'Full Self-Driving' (electrek.co)
- 188Stop big tech from making users behave in ways they don't want to (economist.com)
- 169Heat pump sales rise across Europe (pv-magazine.com)
- 66Sierra Raises $950M at $15B Valuation (sierra.ai)
- 5Agent Skills (addyosmani.com)
- 27Show HN: nfsdiag – A NFS diagnostic application (github.com)
- 14A little comparison between R and Kap (blog.dhsdevelopments.com)
- 30The Visible Zorker: Zork 3 (eblong.com)
- 11Transformers Are Inherently Succinct (arxiv.org)
- 112“Kitten Space Agency”, a Spiritual Successor to “Kerbal Space Program” (2025) (space.com)
- 5Frizbee is a tool you may throw a tag at and it comes back with a checksum (github.com)
- 89Offenders sentenced up to 10 years for spying on TSMC (taipeitimes.com)
- 121Newton's law of gravity passes its biggest test (science.org)
- 119Why are neural networks and cryptographic ciphers so similar? (2025) (reiner.org)