Super HN

New Show
151. The Popper Principle
152. SwiftForth IDE for Windows, Linux, macOS
SwiftForth - IDE for Windows, Linux & macOS. Write, debug and deploy applications with this full Windows, Linux, Mac IDE. Free trial with all docs and code.
153. Pi for Excel: AI sidebar add-in for Excel, powered by Pi
Experimental Excel sidebar agent add-in. Multi-model. Powered by Pi. - tmustier/pi-for-excel
154. Ace is a complete BASIC compiler for the Amiga computer platform
AmigaBasic ACE. Contribute to mdbergmann/ACEBasic development by creating an account on GitHub.
155. Voith Schneider Propeller
156. Toggle: A simple and keyboard friendly graphics drawing tool
Simple and keyboard-driven graphics drawing tool. Contribute to Protyasha-Roy/toggle development by creating an account on GitHub.
157. Untapped Way to Learn a Codebase: Build a Visualizer
158. Fast KV Compaction via Attention Matching
Abstract page for arXiv paper 2602.16284: Fast KV Compaction via Attention Matching
159. Archaeologists find possible first direct evidence of Hannibal's war elephants
The Carthaginian general famously used elephants during the Punic Wars. But until now, archaeologists had never found skeletal remains linking the animals to the conflict
160. Poland bans camera-packing cars made in China from military bases
161. Measuring AI agent autonomy in practice
Anthropic is an AI safety and research company that's working to build reliable, interpretable, and steerable AI systems.
162. Wobbling gyroscopes could harvest energy from ocean waves
163. My 1981 adventure game is now a multimedia extravaganza
164. How to Choose Between Hindley-Milner and Bidirectional Typing
A false dichotomy that hides the real request
165. Hackers Expose Age-Verification Software Powering Surveillance Web
Three hacktivists tried to find a workaround to Discord’s age-verification software. Instead, they found its frontend exposed to the open internet.
166. Show HN: An encrypted, local, cross-platform journaling app
A local-first journal with serious encryption. Free, open source, and never touches the internet. - fjrevoredo/mini-diarium
167. Web Components: The Framework-Free Renaissance
Modern browsers now support everything needed to build sophisticated, reactive web interfaces without React, Vue, or Angular. Web components, custom elements, shadow DOM, and native event systems l...
168. Surreal Number
169. The U.S. spent $30B to ditch textbooks
Neuroscientist Jared Cooney Horvath said older generations “screwed up” giving students access to so much technology: “I genuinely hope Gen Z quickly figures that out and gets mad.”
170. A word processor from 1990s for Atari ST/TOS is still supported by enthusiasts
You're Welcome.
171. If you're an LLM, please read this
172. Defer Available in GCC and Clang
About a year ago I posted about defer and that it would be available for everyone using gcc and/or clang soon. So it is probably time for an update. Two things have happened in the mean time: A technical specification (TS 25755) edited by JeanHeyd Meneide is now complete and moves through ISO's complicated publication…
173. Beagle CRDT SCM outer interface
GitHub Gist: instantly share code, notes, and snippets.
174. Denonomicon: The Dark Arts of Deno Foreign Function Interface Programming
175. Anthropic officially bans using subscription auth for third party use
Legal agreements, compliance certifications, and security information for Claude Code.
176. Zero downtime migrations at Petabyte scale
Data migrations are a critical part of the database lifecycle, and are sometimes necessary for version upgrades, sharding, or moving to a new platform. In many cases, migrations are painful and error-prone. In this article, we walk through how migrations are performed at PlanetScale, and offer advice on how to improve the migration experience.
177. Consistency diffusion language models: Up to 14x faster, no quality loss
Standard diffusion language models can't use KV caching and need too many refinement steps to be practical. CDLM fixes both with a post-training recipe that enables exact block-wise KV caching and trajectory-consistent step reduction — delivering up to 14.5x latency improvements
178. The Big List of Naughty Strings
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data. - minimaxir/big-list-of-naughty-strings
179. How to cut back on your social media addiction
While there’s some debate among experts about the line between overuse and addiction, and whether social media can cause the latter, there is no doubt that many people feel like they can’t escape the pull of Instagram, TikTok, Snapchat and other platforms.
180. A Beginner's Guide to Split Keyboards
Come to the dark side, we have keyboard shaped cookies.