Value-pool based caching for Java applications
(news.ycombinator.com)
11041.
11042.
Nix Derivation Madness
(news.ycombinator.com)
11043.
A theoretical way to circumvent Android developer verification
(news.ycombinator.com)
11044.
Active listening: the Swiss Army Knife of communication
(news.ycombinator.com)
11045.
What is Bending Spoons? Everything to know about AOL’s acquirer
(techcrunch.com)
11046.
Fungus: The Befunge CPU(2015)
(news.ycombinator.com)
11047.
Trump’s swift demolition of East Wing may have launched asbestos plumes
(arstechnica.com)
11048.
GTA VI developer accused of union busting in mass firings
(theverge.com)
11049.
11050.
Two Windows vulnerabilities, one a 0-day, are under active exploitation
(arstechnica.com)
11051.
How to cancel or pause your YouTube TV subscription
(engadget.com)
11052.
Signs of introspection in large language models
(news.ycombinator.com)
11053.
11054.
Bluesky hits 40 million users, introduces ‘dislikes’ beta
(techcrunch.com)
11055.
11056.
11057.
11058.
11061.
Alleged Meduza Stealer malware admins arrested after hacking Russian org
(bleepingcomputer.com)
11062.
11063.
11064.
Kimi Linear: An Expressive, Efficient Attention Architecture
(news.ycombinator.com)
11065.
11067.
Show HN: Ellipticc Drive – open-source cloud drive with E2E and PQ encryption
(news.ycombinator.com)
11068.
If a pilot ejects, what is the autopilot programmed to do? (2018)
(news.ycombinator.com)
11069.
11070.
Major telecom services provider Ribbon breached by state hackers
(bleepingcomputer.com)