- 156Simple trick to increase coverage: Lying to users about signal strength (nickvsnetworking.com)
- 391Facts about throwing good parties (atvbt.com)
- 229Paris had a moving sidewalk in 1900, and a Thomas Edison film captured it (2020) (openculture.com)
- 37Oxy is Cloudflare's Rust-based next generation proxy framework (blog.cloudflare.com)
- 254Using FreeBSD to make self-hosting fun again (jsteuernagel.de)
- 26When models manipulate manifolds: The geometry of a counting task (transformer-circuits.pub)
- 110Alleged Jabber Zeus Coder 'MrICQ' in U.S. Custody (krebsonsecurity.com)
- 206Why don't you use dependent types? (lawrencecpaulson.github.io)
- 273Tongyi DeepResearch – open-source 30B MoE Model that rivals OpenAI DeepResearch (tongyi-agent.github.io)
- 54How the Mayans were able to accurately predict solar eclipses for centuries (phys.org)
- 146Lisp: Notes on its Past and Future (1980) (www-formal.stanford.edu)
- 367URLs are state containers (alfy.blog)
- 12Syllabi – Open-source agentic AI with tools, RAG, and multi-channel deploy (syllabi-ai.com)
- 105Reproducing the AWS Outage Race Condition with a Model Checker (wyounas.github.io)
- 15Collatz-Weyl Generators: Pseudorandom Number Generators (2023) (arxiv.org)
- 60Why does Swiss cheese have holes? (usdairy.com)
- 24Underdetermined Weaving with Machines (2021) [video] (youtube.com)
- 314Notes by djb on using Fil-C (cr.yp.to)
- 8Terahertz Tech Sets Stage for "Wireless Wired" Chips (spectrum.ieee.org)
- 153X.org Security Advisory: multiple security issues X.Org X server and Xwayland (lists.x.org)
- 86Is Your Bluetooth Chip Leaking Secrets via RF Signals? (semanticscholar.org)
- FurtherAI (Series A – A16Z, YC) Is Hiring Across Software and AI
job - 16New Prompt Injection Papers: Agents Rule of Two and the Attacker Moves Second (simonwillison.net)
- 24I ****Ing Hate Science (2021) (buttondown.com)
- 40Solar-powered QR reading postboxes being rolled out across UK (bbc.co.uk)
- 121Autodesk's John Walker Explained HP and IBM in 1991 (2015) (cringely.com)
- 275Anti-cybercrime laws are being weaponized to repress journalism (cjr.org)
- 66The x86 Interrupt List, aka “Ralf Brown's Interrupt List” (2018) (cs.cmu.edu)
- 304Backpropagation is a leaky abstraction (2016) (karpathy.medium.com)
- 100Writing FreeDOS Programs in C (freedos.org)