Googlebook

https://www.gstatic.com/marketing-cms/assets/images/27/26/efcc236844ccb833b92620413427/magic-cursor-band-assets.webp=n-w353-h285-fcrop64=1,000009fbfffff605-rw
Meet Googlebook: A new kind of laptop designed for Gemini Intelligence. Built with heavyweight power and perfectly in sync with your Android Phone. Sign up for updates and stay in the know.

The Rise of the Bullshittery

https://xn--gckvb8fzb.com/the-rise-of-the-bullshittery/images/cover_hu_5ad0e8b34617f779.webp
The modern economy rewards people who appear competent rather than those who actually are, creating an environment where substance is undervalued and superficiality is overvalued. Honest professionals are being pushed to the side as the market prioritizes visibility and loud claims over credibility and truth.

CERT is releasing six CVEs for serious security vulnerabilities in dnsmasq

CERT is releasing six CVEs for serious dnsmasq security vulnerabilities. Patches are available and a new stable release, dnsmasq-2.92rel2, has been made with the fixes applied.

Show HN: Needle: We Distilled Gemini Tool Calling into a 26M Model

https://raw.githubusercontent.com/cactus-compute/needle/main/assets/banner.png
Gemini 3.1 was distilled into a 26m Simple Attention Network, Needle, for consumer devices. Needle outperforms other models in single-shot function calls but may be finicky and less effective in conversational settings.

Why senior developers fail to communicate their expertise

https://www.nair.sh/_next/image?url=%2Fimages%2Fwsdftc%2Fwsdftc_cover.png&w=3840&q=75&dpl=dpl_EJNiu3FBjkX8yJSwwGtmqoePQNU6
Senior developers worry about complexity, while others want to reduce uncertainty. They should communicate solutions in terms of uncertainty reduction, not complexity management.

The Future of Obsidian Plugins

https://obsidian.md/images/blog/2026-community-search.png
Obsidian Community is launched with a new directory and developer dashboard for plugins and themes. Automated reviews ensure safety and security of the Obsidian ecosystem.

Rendering the Sky, Sunsets, and Planets

https://assets.maximeheckel.com/images/blog/shuttle.webp?w=3840&q=100
The user implemented an atmospheric scattering shader post-processing effect to render a realistic sky and atmosphere in real-time, using raymarching, Rayleigh and Mie scattering, and ozone absorption to achieve a natural color for any altitude. The user also explored a more performant approach using Look Up Tables (LUTs) to store precomputed scattering calculations, resulting in a ...

Quack: The DuckDB Client-Server Protocol

https://duckdb.org/images/blog/quack/quack-bulk-light.svg
DuckDB instances can now communicate with each other using the Quack protocol, enabling client-server setups and concurrent writers. Quack is built on HTTP and optimized for low overhead and fast bulk data transfer.

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim

https://cdn.prod.website-files.com/686c11d5bee0151a3f8021d6/6a03271477c3b2aa1e7eaaec_BLOG-Dead-Letter-CVE-2026-45185-01.png
A vulnerability in Exim's TLS connection handling was discovered and reported, allowing for remote code execution with almost no special server configuration. The vulnerability was exploited using a large language model (LLM) in a contest, with the LLM producing a working solution for the first stage of the exploit.

Bambu Lab is abusing the open source social contract

Bambu Lab is threatening an open source developer with legal action for using their code in a fork of OrcaSlicer. They claim the developer is impersonating their client and creating a security risk, but the developer says they're just using upstream code verbatim.

Learning Software Architecture

To learn software design skills as a researcher physicist, it's essential to understand that software design is best learned by doing and adapting to the social context of the project, rather than following formal rules or guidelines. Key recommendations include practicing, paying attention to boundaries, testing, and Conway's Law, and considering resources such as the Boundaries talk by Gary ...

When life gives you lemons, write better error messages

https://miro.medium.com/v2/resize:fit:813/1*TpQzPue3oTK6J6oYZyQTtA.png
Wix revamped its error messages to be clear, concise, and user-friendly. They defined what makes a good error message and worked together to replace thousands of generic and unclear messages.

Show HN: Agentic interface for mainframes and COBOL

https://www.hypercubic.ai/_next/image?url=%2Fassets%2Fhopper%2Fhopper_hero_img.jpg&w=3840&q=75
Hopper uses AI agents to navigate and operate inside z/OS from a modern development environment. It drives ISPF, writes JCL, and queries VSAM with SQL-like functionality.

Instructure pays ransom to Canvas hackers

https://www.insidehighered.com/sites/default/files/styles/max_650x650/public/2026-05/hacking_lock.jpg?itok=mGymN76y
Instructure paid a ransom to hackers who breached its learning management system Canvas, returning data of 275 million users. The company claims hackers have destroyed the data and will not extort customers, but the deal's value remains undisclosed.

Snowflake Postgres, Lakebase, HorizonDB: Picking the Lock-In You Want

https://thebuild.com/media/media/79875ce29f9f49efab713b13dc31f0a2_f2kg0IJ.png
In the last twelve months, three of the biggest data-platform companies have shipped a Postgres-flavored database with a custom storage layer and a “scale-out compute, shared storage” architecture. Snowflake Postgres is GA, built on the Crunchy Data team’s work, with pg_lake as the lakehouse hook. Databricks Lakebase is GA on AWS, public preview on Azure, built on the Neon engine plus the ...

We accidentally recreated old Facebook

https://amrshawky.com/images/interface-bg.png
PicPocket.io is a platform that reuses chat interfaces for photo sharing and organization, allowing users to find memories by people in the photos. The platform has evolved into a feed-based social network with a focus on sharing content with specific audiences, similar to old Facebook.

Show HN: Statewright – Visual state machines that make AI agents reliable

https://raw.githubusercontent.com/statewright/statewright/main/docs/images/workflow-editor.png
Statewright is a tool that enforces workflow constraints on AI agents to prevent overfitting and improve performance. It uses state machines to limit tool access and provide clear instructions to the model at each phase.

Screenshots of Old Desktop OSes

http://www.typewritten.org/Media/Thumbs/thn-visi-on-1.0.png
The user provided a large collection of screenshots showcasing various operating systems and graphical user interfaces from the 1980s to the early 2000s, including GEM, OS/2, Windows, and NeXTSTEP. The screenshots demonstrate the evolution of GUIs, highlighting the differences in design, functionality, and performance across various platforms and releases.

Show HN: Gigacatalyst – Extend your SaaS with an embedded AI builder

Namanyay from Gigacatalyst offers an AI customization layer for SaaS platforms, allowing non-technical users to build custom workflows via natural language. This helps businesses save time and increase revenue by reducing custom requests and engineering roadmaps.

Postmortem: TanStack NPM supply-chain compromise

https://tanstack.com/images/logos/logo-black.svg
An attacker compromised 42 @tanstack/* npm packages by combining GitHub Actions cache poisoning and runtime memory extraction of an OIDC token, publishing 84 malicious versions on 2026-05-11. The attack was detected within 20 minutes by an external researcher and all affected versions have been deprecated, but users who installed the affected versions are recommended to rotate their credentials.

Canada’s Bill C-22 Is a Repackaged Version of Last Year’s Surveillance Nightmare

https://www.eff.org/files/banner_library/encryption-poc-chelsea-saunders.png
Canadian government's Bill C-22, the Lawful Access Act, erodes digital rights by forcing companies to record and retain metadata and create backdoors for law enforcement. This bill expands surveillance and data sharing with foreign governments, threatening Canadians' privacy and digital security.

Text Blaze (YC W21) Is Hiring for a No-AI Summer Internship

https://bookface-images.s3.amazonaws.com/small_logos/3155ba3b687741c19a97719f6f226e3e148c98f5.png
We're offering a "No AI Summer" internship for junior developers to learn full-stack engineering without AI tools, focusing on JavaScript, React, and GCP. The internship aims to develop critical thinking and problem-solving skills in a challenging environment with a small team.

Unauthorized Anthropic stock sales and investment scams

https://downloads.intercomcdn.com/i/o/487548/17213f6a445c8e6e874b1f4b/fad85208982e639d11b9108df895a293.png
Anthropic stock transfer restrictions void any sale or transfer without Board approval. Be cautious of investment scams claiming to offer indirect access to Anthropic stock.

The Moth Story Map

https://themoth-images-development.s3.amazonaws.com/Facebook-Meta.png
The Moth has open applications for its All City program for high school students and Moth Teacher Institute for 5-12 teachers. The Moth also released an instructional video on storytelling structure using the STORY MAP.

Testing UPS Output Waveforms

The user tested various UPS models from APC and Eaton, measuring their output signals using an oscilloscope and a Chroma 61507 AC power source. The results showed varying levels of waveform quality, with some models producing pure sine waves and others simulated sine waves with blocky or jagged signals.

Launch HN: Voker (YC S24) – Analytics for AI Agents

https://cdn.prod.website-files.com/69d57891b4f6c4aff88c95ff/69eb2618ec2c1cafb08e32be_Voker%20Icon%20Set_Usage%20Data%201.svg
Voker provides analytics for AI agents, offering insights into performance and outcomes. It helps teams track agent interactions, identify knowledge gaps, and measure improvement over time.

SQL: Incorrect by Construction

The design of SQL and relational database systems makes it easy to accidentally introduce serious concurrency bugs. Below is a textbook money-transfer procedure in TSQL; Alice wants to send ten dollars to Bob, and to keep Alice from overdrafting her account, we first check that she has enough money. The code looks completely reasonable, but it has several critical bugs. Can you spot them? ...

The Real Story of Troy

Heinrich Schliemann discovered Troy in 1873 but found a 2400 BC treasure, 1000 years before the Trojan War. His 17-meter trench destroyed half of the site, and he misdated the treasure by a millennium.

They Live (1988) inspired Adblocker

https://raw.githubusercontent.com/davmlaw/they_live_adblocker/main/docs/they-live-billboards.jpg
A fork of uBlock Origin Lite, uBOLite_theylive, replaces cosmetic-blocked ads with white tiles bearing They Live slogans. It requires manual installation and configuration in Chromium-based browsers.

The Surprisingly Long Life of the Vacuum Tube

https://substackcdn.com/image/fetch/$s_!s3OW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48d5bbd5-2579-4ffb-9519-47997926caae_1200x854.png
Vacuum tubes, invented in the 19th century, enabled numerous technological advancements, including radios, TVs, computers, and medical equipment. They were eventually replaced by semiconductor-based technologies, but many vacuum tube devices remain in use today.