- 60Rupert's Property (johncarlosbaez.wordpress.com)
- 2AI Competition explained in 10 minutes [video] (youtube.com)
- 2Show HN: Security Test Framework – 16 automated security checks (npmjs.com)
- 10Why Collaborate with XAI? (github.com)
- 3End of the Line? (thenation.com)
- 15An eyecare foundation model for clinical assistance (nature.com)
- 4Widespread Data Theft Targets Salesforce Instances via Salesloft Drift (cloud.google.com)
- 3Hmpl.js vs. Alpine.js vs. Htmx (Aug. 2025) (imgur.com)
- 4Doing Figma Last (twitter.com)
- 3NX Hack: stolen GitHub credential used to turn private repositories public (github.com)
- 2The Evolution: From Atomic Options to Lygos Credit (blog.lygos.finance)
- 18Diablo Game Developers Join Communications Workers of America (cwa-union.org)
- 130The Space Shuttle Columbia disaster and the over-reliance on PowerPoint (2019) (mcdreeamiemusings.com)
- 4Apple Releases Xcode 26 Beta 7 with GPT-5 Support and Claude Integration (macrumors.com)
- 5The Dumbest Phone Is Parenting Genius (theatlantic.com)
- 3Why Particle Size Distribution Matters for Optical PM Sensors (airgradient.com)
- 4Eco-driving measures could significantly reduce vehicle emissions (techxplore.com)
- 4In Boston, Trucks Keep Crashing into Low Bridges (wsj.com)
- 3We Did Margin-Negative Computing Before It Was Cool, and It Was Silly (blog.railway.com)
- 3NXSweep: Using the NX AI Exploit Logic for Blue Teaming (yashthapliyal.com)
- 4Linux Foundation Opens the Door to DocumentDB (thenewstack.io)
- 87Sometimes CPU cores are odd (anubis.techaro.lol)
- 4Starship Will Reduce Bandwidth Launch Cost by Up to 50x (research.33fg.com)
- 4Kick Ass – Destroy the Web (kickassapp.com)
- 4The Authoritarian Checklist (donmoynihan.substack.com)
- 134Expert: LSP for Elixir (github.com)
- 2Top Down versus Bottom Up AI Adoption (substack.com)
- 2Show HN: Smart Buildings Powered by SparkplugB, Aklivity Zilla, and Kafka (github.com)
- 3The Bitter Lesson Is Misunderstood – By Kushal Chakrabarti (obviouslywrong.substack.com)
- 14Stop Using Vulnerability Counts to Measure Software Security (cacm.acm.org)