1.
2.
3.
The Zig project's rationale for their anti-AI contribution policy
(news.ycombinator.com)
4.
The Zig project's rationale for their firm anti-AI contribution policy
(news.ycombinator.com)
5.
Vect 2.0 Ransomware Acts as Wiper, Thanks to Design Error
(darkreading.com)
6.
Low-Compilation-Cost Register Allocation in LLVM-Based Binary Translation
(news.ycombinator.com)
7.
10.
11.
12.
Show HN: Turning a Gaussian Splat into a videogame
(news.ycombinator.com)
13.
Kyber ransomware gang toys with post-quantum encryption on Windows
(bleepingcomputer.com)
14.
CISA flags new SD-WAN flaw as actively exploited in attacks
(bleepingcomputer.com)
15.
Show HN: Holos – QEMU/KVM with a compose-style YAML, GPUs and health checks
(news.ycombinator.com)
16.
Show HN: Docker Compose for VM's
(news.ycombinator.com)
17.
A simplified model of Fil-C
(news.ycombinator.com)
18.
Show HN: Smol machines – subsecond coldstart, portable virtual machines
(news.ycombinator.com)
19.
Precision over perception: Why architecture matters in benchmarking
(news.ycombinator.com)
20.
Tracking down a 25% Regression on LLVM RISC-V
(news.ycombinator.com)
21.
JVM Options Explorer
(news.ycombinator.com)
22.
I've Seen a Thousand OpenClaw Deploys. Here's the Truth
(news.ycombinator.com)
23.
"Negative" views of Broadcom driving VMware migrations, rival says
(news.ycombinator.com)
25.
26.
Show HN: Druids – Build your own software factory
(news.ycombinator.com)
27.
I've sold out
(news.ycombinator.com)
28.
I've Sold Out
(news.ycombinator.com)
29.
Perfmon – Consolidate your favorite CLI monitoring tools into a single TUI
(news.ycombinator.com)
30.
Go on Embedded Systems and WebAssembly
(news.ycombinator.com)