| 421. | An AI pioneer says the technology is 'limited' and won't replace humans soon | (nbcnews.com) |
|
Andrew Ng sees AI as a revolution in the making, predicting continued progress despite controversies and claims of a bubble. | |
| 5 points by nis0s 1 day ago | 3 comments |
| 422. | Claude Code gets native LSP support | (github.com) |
|
|
Claude Code is an agentic coding tool that lives in your terminal, understands your codebase, and helps you code faster by executing routine tasks, explaining complex code, and handling git workflows - all through natural language commands. - claude-code/CHANGELOG.md at main · anthropics/claude-code | |
| 15 points by JamesSwift 7 days ago | 0 comments |
| 423. | Algerian law declares France's colonisation a crime | (bbc.com) |
|
Lawmakers unanimously approve a law, which demands an apology and reparations from the former colonial power. | |
| 4 points by teleforce 4 days ago | 0 comments |
| 424. | Name That Part: 3D Part Segmentation and Naming | (name-that-part.github.io) |
|
|
Name That Part: 3D Part Segmentation and Naming | |
| 6 points by unisub_guy 5 days ago | 1 comments |
| 425. | People Who Drink Bottled Water Daily Get 90k More Microplastic Particles a Year | (wired.com) |
|
|
Drinking water in plastic bottles contains countless particles too small to see. New research finds that people who drink water from them on a daily basis ingest far more microplastics than those who don’t. | |
| 7 points by beardyw 1 day ago | 1 comments |
| 426. | Secure Key Storage (SKS) is a library for Go that abstracts Security Hardware | (github.com) |
|
|
Secure Key Storage (SKS) is a library for Go that abstracts Security Hardware on laptops. - facebookincubator/sks | |
| 3 points by keepamovin 4 days ago | 0 comments |
| 427. | Show HN: I embedded 10M StreetView images | (view.geospot.sdan.io) |
|
||
| 4 points by sdan 4 days ago | 1 comments |
| 428. | Yann LeCun: New Vision Language JEPA with Better Performance Than LLMs | (arxiv.org) |
|
|
Abstract page for arXiv paper 2512.10942: VL-JEPA: Joint Embedding Predictive Architecture for Vision-language | |
| 6 points by bluedevilzn 3 days ago | 0 comments |
| 429. | Ubisoft helpdesk staff in India accepted bribes to hack player accounts | (twitter.com) |
|
|
||
| 5 points by sergiotapia 21 hours ago | 1 comments |
| 430. | I Built a Minimal Website and Google Ignored It | (gokhanarkan.com) |
|
|
My traffic halved overnight. Here's what I learned about SEO, structured data, and why even minimal websites need to speak Google's language. | |
| 3 points by gokh 3 days ago | 0 comments |
| 431. | Fixing HN comments with breadth-first navigation | (pratik.is) |
|
||
| 4 points by news_hacker 5 days ago | 1 comments |
| 432. | Here's Why Your Turn Signals Make That Clicking Noise | (jalopnik.com) |
|
When you hit your car’s turn signal stalk and that little arrow flashes at you on the dash, you always hear a rhythmic clicking sound in sync with that flashing arrow. Here’s what that is. | |
| 3 points by thunderbong 1 day ago | 0 comments |
| 433. | URL Pattern API | (developer.mozilla.org) |
|
|
The URL Pattern API defines a syntax that is used to create URL pattern matchers. These patterns can be matched against URLs or individual URL components. | |
| 6 points by thunderbong 4 days ago | 1 comments |
| 434. | NPM Package with 56K Downloads Caught Stealing WhatsApp Messages | (koi.ai) |
|
||
| 28 points by sohkamyung 6 days ago | 6 comments |
| 435. | Is Northern Virginia Still the Least Reliable AWS Region? | (statusgator.com) |
|
|
||
| 6 points by colinbartlett 5 days ago | 1 comments |
| 436. | A Tale of Two Leaks: How Hackers Breached the Great Firewall of China [video] | (media.ccc.de) |
|
The Great Firewall of China (GFW) is one of, if not arguably the most advanced Internet censorship systems in the world. Because repressi... | |
| 3 points by brewmarche 2 days ago | 0 comments |
| 437. | Custom Cross Compiler with Nix | (hobson.space) |
|
|
How to use a custom cross compiler with nix | |
| 4 points by todsacerdoti 5 days ago | 0 comments |
| 438. | Elephant habituation to drones as a behavioural observation tool | (nature.com) |
|
Unmanned Aerial Vehicles, known as UAVs or drones, are increasingly important as a tool in wildlife research and conservation. However, it is crucial to quantify as well as qualify the response of target species to drones. We measured the reaction of African savannah elephants (Loxodonta africana) to an off-the-shelf quadcopter drone during sequences of repeated trials. In total we conducted 35 trials involving 14 distinct and individually identified elephant groups, exposing them to the drone on up to four separate occasions. Half of trials recorded evidence of disturbed behaviour, but the proportion of disturbed elephants returned to levels comparable to pre-exposure by the end of the exposure period, suggesting some degree of habituation to drones over the course of a single trial. Additionally, repeated trials had significantly fewer instances of disturbed behaviour compared to initial trials, suggesting long-term habituation as well. Nonetheless, some small-scale changes in activity patterns were observed even after repeated trials. Our results suggest that elephants can habituate to drones, especially when they are flown according to guidelines which minimise disturbance. This indicates that drones can be used as a minimally invasive technology to monitor elephant behaviour provided that baseline activity patterns are recorded and quantified prior to drone exposure. | |
| 4 points by PaulHoule 1 day ago | 0 comments |
| 439. | FEDAnet Project | (feda.croco.net) |
|
|
||
| 3 points by fedanet 3 days ago | 0 comments |
| 440. | More than 20% of videos shown to new YouTube users are 'AI slop', study finds | (theguardian.com) |
|
Low-quality AI-generated content is now saturating social media – and generating about $117m a year, data shows | |
| 5 points by schu 2 days ago | 0 comments |
| 441. | When US Cavalry&Germans Fought Together in WWII&Saved 1.2k Horses from Soviets | (military.com) |
|
Operation Cowboy stands as one of only two documented occasions during World War II when U.S. and Wehrmacht forces fought alongside each other against a common enemy. The raid saved more than 1,200 horses, including 375 irreplaceable Lipizzaners whose bloodlines stretched back four centuries through the Habsburg Dynasty. Days later, the Czechs greeted their American liberators with flowers as U.S. armor rolled into Pilsen. But the Yalta Conference had assigned Czechoslovakia to the Soviet sphere of influence. | |
| 4 points by bookofjoe 1 day ago | 0 comments |
| 442. | Brazil's first arid zone is a stark warning for the whole country | (theguardian.com) |
|
The Caatinga in the north-east has been transformed by the heating climate in just a generation and could become the country’s first desert | |
| 6 points by pera 1 day ago | 1 comments |
| 443. | CEO of Health Care Software Company Sentenced for $1B Fraud Conspiracy | (justice.gov) |
|
|
||
| 4 points by healsdata 2 days ago | 0 comments |
| 444. | Henge Finder | (hengefinder.rcdis.co) |
|
|
||
| 3 points by recursecenter 7 days ago | 0 comments |
| 445. | Ruby::Box | (docs.ruby-lang.org) |
|
|
class Ruby::Box: Ruby Box - Ruby's in-process separation of Classes and Modules Ruby Box is designed to provide separated spaces in a Ruby process, to isolate applica | |
| 3 points by tosh 3 days ago | 0 comments |
| 446. | World's largest functioning musical instrument: Wanamaker Organ in Philadelphia | (en.wikipedia.org) |
|
|
||
| 4 points by bookofjoe 1 day ago | 0 comments |
| 447. | The Compiler Is Your Best Friend, Stop Lying to It | (blog.daniel-beskin.com) |
|
The compiler is a powerful tool, yet many developers have a painful relationship with it. Can we do better? | |
| 3 points by sothatsit 2 days ago | 0 comments |
| 448. | A U.S. Startup Trying to Break China's Rare-Earth Monopoly | (nytimes.com) |
|
|
||
| 5 points by fleahunter 12 hours ago | 0 comments |
| 449. | Governments in the West Are Turning Their Sights on VPNs | (nakedcapitalism.com) |
|
|
“Politicians have now discovered that people are using VPNs to protect their privacy and bypass these invasive laws. Their solution? Entirely ban the use of VPNs." | |
| 8 points by indigodaddy 3 days ago | 0 comments |