Understanding the Worst .NET Vulnerability
andrewlock.net
Poker Tournament for LLMs
pokerbattle.ai
Picture gallery: Amiga prototype "Lorraine" at the Amiga 40 event
amiga-news.de
How the brain's activity, energy use and blood flow change as people fall asleep
massgeneralbrigham.org
Geometry and Physics of Wrinkling (2003) [pdf]
softmath.seas.harvard.edu
10M people watched a YouTuber shim a lock; the lock company sued him – bad idea
arstechnica.com
The Programming Languages Zoo
plzoo.andrej.com
Complete Digitization of Leonardo da Vinci's Codex Atlanticus
openculture.com
Situated Software – Clay Shirky (2004)
shirky.com
SATisfying Solutions to Difficult Problems
vaibhavsagar.com
Simplify your code: Functional core, imperative shell
testing.googleblog.com
JetKVM – Control any computer remotely
jetkvm.com
Study finds growing social circles may fuel polarization
phys.org
Pyrex catalog from from 1938 with hand-drawn lab glassware [pdf]
exhibitdb.cmog.org
DJI Removes Video Shot in National Parks After It Raises Eyebrows
petapixel.com
OpenAI says over a million people talk to ChatGPT about suicide weekly
techcrunch.com
Criminal complaint against facial recognition company Clearview AI
noyb.eu
Dust samples from moon's far side show debris from rare, water-rich meteorites
sciencealert.com
Why Busy Beaver hunters fear the Antihydra
benbrubaker.com
Your vibe coded slop PR is not welcome
samsaffron.com
Linux VM without VM software – User Mode Linux
popovicu.com
Study paper: https://www.pnas.org/doi/10.1073/pnas.2501614122