- 2Wound-dependent leg amputations to combat infections in an ant society (cell.com)
- 8A School Burned After Aid Arrived. Witnesses Say Soldiers Started the Fire (haaretz.com)
- 1Skipping Tests to Deliver Faster (shermanonsoftware.com)
- 1The Libertarian Coder (rethinkingsoftware.substack.com)
- 2Phobos Ransomware Admin Extradited from South Korea to Face Cybercrime Charges (justice.gov)
- 2The development and challenges of poly lactic acid and poly glycolic acid (2020) (sciencedirect.com)
- 2Modelling Hannibal's battle of Cannae suggests standard explanation infeasible (youtube.com)
- 3Ask HN: Why hasn't the JavaScript event loop model scaled horizontally? ()
ask - 174Finland and Lithuania Report Severed Undersea Data Cables (bloomberg.com)
- 4Morality Makes for Bad Policy – By Asa Downs (asadowns.substack.com)
- 1Zapier-like automated workflows for Web3 devs [video] (youtube.com)
- 4Undersea data cable between Germany and Finland broken (dw.com)
- 1DOS Days – Borland International (dosdays.co.uk)
- 2Preventing conflicts in authoritative DNS config using formal verification (blog.cloudflare.com)
- 143AMD now has more compute on the top 500 than Nvidia (nextplatform.com)
- 2"Ridiculously Cool" Rope Cloud Spotted Hovering over Heart Mountain (cowboystatedaily.com)
- 1Inslaw (en.wikipedia.org)
- 11Windows Zero-Day Exploited by Russia Triggered with File Drag-and-Drop, Delete (securityweek.com)
- 3Linux 6.13 Rolling Out NVMe 2.1 Support and NVMe Rotational Media (phoronix.com)
- 1Show HN: Ylem – an open-source orchestrator for real-time data streaming (github.com)
- 3April Fools' joke results in Japanese firm making a beige '80s throwback PC case (arstechnica.com)
- 1Default Denied: On not emumerating badness (cybershow.uk)
- 1Why targeted tariffs are more effective than broad tariffs (noahpinion.blog)
- 2Is Deep Learning Hitting a Wall? (garrisonlovely.substack.com)
- 1Monthly Roundup #24: November 2024 (thezvi.substack.com)
- 1Bayesian Models of Cognition (mitpress.mit.edu)
- 1Syntax Highlighting SwiftUI Code with Swift Syntax (sahandnayebaziz.org)
- 1Questioning the criteria for evaluating non-cryptographic hash functions (queue.acm.org)
- 2Carl Pei says Nothing could build its own operating system (techcrunch.com)
- 2Show HN: All your projects get DA 59 backlinks (worldclass.domains)