- 48Machine Learnability as a Measure of Order in Aperiodic Sequences (arxiv.org)
- 15TIL: The Data Furnace (en.wikipedia.org)
- 68Nearly 20 Percent Fewer International Students Traveled to the U.S. in August (nytimes.com)
- 7Show HN: A Digital Twin of my coffee roaster that runs in the browser (autoroaster.com)
- 268Self-hosting email like it's 1984 (maxadamski.com)
- 476Niri – A scrollable-tiling Wayland compositor (github.com)
- 266Show HN: Write It Down – Personal finance tracker (write-it-down.com)
- 15Catalyst evolution reveals the unsung heroes in industrial ammonia production (phys.org)
- 134California needs to learn from Houston and Dallas about homelessness (governance.fyi)
- 427PEP 810 – Explicit lazy imports (peps.python.org)
- 148How we are building Audacity 4 (youtube.com)
- 116Binary Formats Gallery (formats.kaitai.io)
- 35Audacity 4: a glimpse of a new, more modern UI for the free audio editor (cdm.link)
- 133Show HN: Pyscn – Python code quality analyzer for vibe coders (github.com)
- 135Sora Update #1 (blog.samaltman.com)
- 200Why I chose Lua for this blog (andregarzia.com)
- 1191Password CLI Vulnerability (codeberg.org)
- 71Baseball durations after the pitch clock (leancrew.com)
- 12The 47-Day Certificate Ultimatum: How Browsers Broke the CA Cartel (certkit.io)
- 267Earth was born dry until a cosmic collision made it a blue planet (sciencedaily.com)
- 288Jeff Bezos says AI is in a bubble but society will get 'gigantic' benefits (cnbc.com)
- 224Blog Feeds (blogfeeds.net)
- 130Newton: physics simulation engine built upon NVIDIA Warp (github.com)
- 362The deadline isn't when AI outsmarts us – it's when we stop using our own minds (theargumentmag.com)
- 20Show HN: Meihus – Mortgage calculator that shows early payment impact monthly (meihus.com)
- 20Building Effective Text-to-3D AI Agents: A Hybrid Architecture Approach (addy.rocks)
- 1197How Israeli actions caused famine in Gaza, visualized (cnn.com)
- 549Inkjet printer with DRM-free ink will be launched via a crowdfunding campaign (notebookcheck.net)
- 41Build a VPN Tunnel with Wintun on Windows – Part 1 (0xmm.in)
- 240NSA and IETF: Can an attacker purchase standardization of weakened cryptography? (blog.cr.yp.to)