State of Kdenlive

https://kdenlive.org/news/2026/state-2026/otiov.png
The Kdenlive team made significant progress in 2025, releasing new features, bug fixes, and improvements to the user interface, with a focus on stability and community support. The team is now looking ahead to upcoming features, including 10/12 bit color support, playback optimizations, and OpenFX support, and is grateful for community contributions and donations that enable continued development.

Michael Rabin Has Died

https://upload.wikimedia.org/wikipedia/commons/thumb/4/49/M_O_Rabin.jpg/250px-M_O_Rabin.jpg
Michael Oser Rabin was an Israeli mathematician and computer scientist who co-received the 1976 ACM Turing Award for work on computational complexity. He made significant contributions to computer science, including the Miller-Rabin primality test and the Rabin-Karp string search algorithm.

Category Theory Illustrated – Orders

https://abuseofnotation.github.io/category-theory-illustrated/04_order/binary_relation_product.svg
Orders are sets of elements with a binary relation that obeys laws of reflexivity, transitivity, antisymmetry, and totality, defining linear and partial orders. Removing laws from orders results in different structures, such as preorders and equivalence relations, which have various applications in mathematics and computer science.

Amiga Graphics

https://amiga.lychesis.net/assets/Park/Park_AdmiralKirk.png
Launched in 1985 the Commodore Amiga boasted graphics capabilities that were unsurpassed for it's time. It featured an intricate collection of custom chips that enabled it to do things that, until then, had been impossible to achieve with other personal computers. This site is dedicated to graphics made with or for the Commodore Amiga home computer.

Claude Design

https://www.anthropic.com/_next/image?url=https%3A%2F%2Fwww-cdn.anthropic.com%2Fimages%2F4zrzovbb%2Fwebsite%2F499e91975d880b35eac6e48ad43161de7d10416c-2876x1614.jpg&w=3840&q=75
Claude Design is a new product that lets users collaborate with Claude to create visual work like designs, prototypes, and presentations. It's available in research preview for Claude Pro, Max, Team, and Enterprise subscribers, with access included in their plans.

It's OK to compare floating-points for equality

https://lisyarus.github.io/blog/media/compare-floating-points/cover.png
The user discusses the limitations and pitfalls of using epsilon-comparison for floating-point numbers, arguing that it's often a bad solution and can lead to unexpected behavior and bugs. They provide several examples of how to handle floating-point comparisons in a more robust and reliable way, such as using acceptance radii, analyzing the problem, and avoiding epsilons altogether.

Show HN: I made a calculator that works over disjoint sets of intervals

This calculator uses Interval Union Arithmetic to compute results that contain the true value, supporting division by intervals with zero and remaining closed. It interprets numbers as intervals with outward rounding over IEEE 754 double precision floats.

Measuring Claude 4.7's tokenizer costs

https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,quality=80,format=auto,onerror=redirect/uploads/user/profile_picture/a49d6fd3-0a5e-4774-ae9c-16979bd47642/Generated_Image_March_03__2026_-_1_55PM.jpg.jpeg
Anthropic's new Claude Opus 4.7 tokenizer uses 1.3-1.45x more tokens than 4.6. This results in a 20-30% higher per-session cost for a small but real improvement in instruction following.

Towards trust in Emacs

https://eshelyaron.com/assets/trust-manager.gif
Emacs 30 introduced a trust system to prevent arbitrary code execution, but it causes friction by disabling features for untrusted files. trust-manager is a new package that grants trust just-in-time with minimal friction.

All 12 moonwalkers had "lunar hay fever" from dust smelling like gunpowder (2018)

https://www.esa.int/var/esa/storage/images/esa_multimedia/images/2015/03/eugene_cernan/15299754-1-eng-GB/Eugene_Cernan_article.jpg
Lunar dust is toxic and causes health issues in humans due to its sharp, abrasive particles and electrostatic charge. Researchers are studying the dust to estimate the risk and develop protective measures for future lunar missions.

Flock Condemns False Child Predator Allegations, Yet Calls Critics Terrorists

https://s.ipvm.com/uploads/embedded_image/52d48065faf6542ee57a2d8e4b20b521688f35cf1971df62f3224b43fe242e31/placeholder_f662d14a-0960-44e8-8dc2-9516f5b9696b.jpg
Flock faces intense pressure from cities canceling contracts, class action lawsuits, and public backlash over employees accessing cameras. The company's CEO has attacked privacy advocates, labeling them terrorists, which may have contributed to the negative environment.

Spending 3 months coding by hand

https://substackcdn.com/image/fetch/$s_!K739!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F619758e3-8a22-4eff-aa30-e86effa991cd_1536x1024.png
The author is on a 6-week retreat at the Recurse Center to focus on coding without AI, learn Python, and understand computers better. They plan to train an LLM from scratch and improve their programming skills.

A Dumb Introduction to Z3

https://ar-ms.me/stamp.png
Recently I have come across a nice article: Many Hard Leetcode Problems are Easy Constraint Problems, and I figured, I really should learn how to use these things! What else do I really have to do? I have had use for solvers (or as they are commonly called: theorem provers) In a previous article, but then I tried to prove the things with good old algorithms. I looked at z3 at the time, but ...

Brunost: The Nynorsk Programming Language

https://lindbakk.com/static/blog_entries/introducing_brunost/2026-04-14-17-20-39-image.png
The user created a fictional programming language called Brunost, which is based on the Norwegian language Nynorsk and has a unique syntax and features. Brunost is intended as a fun and educational project, not a production-ready language, and the user invites others to contribute to its development on GitHub.

Are the costs of AI agents also rising exponentially? (2025)

https://images.squarespace-cdn.com/content/v1/562652dbe4b05bbfdc596fd7/8b1fd882-f8f8-4879-a008-18902ece6edd/METR+time+horizon+%28log%29.png
The author questions the trend of AI's exponential growth in task length and performance, suggesting that the cost of achieving this performance may be growing exponentially as well, potentially making AI less cost-competitive with humans over time. Analysis of a chart from METR shows that the hourly cost of AI agents is increasing with task duration, suggesting that forecasting AI's ...

A simplified model of Fil-C

Fil-C is a memory-safe implementation of C/C++ that uses a garbage collector and rewrites unsafe code into safe code, including adding AllocationRecord* variables to track memory usage. The simplified model of Fil-C includes a compiler pass that rewrites C/C++ source code, a garbage collector, and additional features such as invisible_bytes and a parallel concurrent incremental collector.

Rewriting Every Syscall in a Linux Binary at Load Time

https://substackcdn.com/image/fetch/$s_!lyym!,f_auto,q_auto:best,fl_progressive:steep/https%3A%2F%2Famitlimaye1.substack.com%2Ftwitter%2Fsubscribe-card.jpg%3Fv%3D131273884%26version%3D9
A binary rewriter replaces syscall instructions in a process's code with a trap that redirects to a custom handler, allowing for complete control over the process's interaction with the outside world. This approach provides a foundation for a minimal VM runtime where untrusted code can run inside a controlled environment with full visibility and control, at a cost of under a microsecond per syscall.

Show HN: Smol machines – subsecond coldstart, portable virtual machines

https://opengraph.githubassets.com/e0e5b6e04690f3f617b2c3a33cb8128ad7ef75ce5c19841be277e075c7dbe120/smol-machines/smolvm
Smolmachines is a tool for running custom Linux virtual machines locally with sub-second cold start, cross-platform support, and elastic memory usage. It allows for sandboxing untrusted code, packing workloads into portable executables, and using git and SSH without exposing keys.

"cat readme.txt" is not safe if you use iTerm2

https://substackcdn.com/image/fetch/$s_!QNEg!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a02736f-409b-4fac-879f-7f0fcaaad68d_2318x1326.png
iTerm2's SSH integration feature can be exploited by impersonating the remote conductor through terminal output. This allows an attacker to execute arbitrary commands on the local machine.

Slop Cop

Slop Cop is a browser-based writing editor that flags generic LLM prose patterns and offers deeper analysis with an Anthropic API key. It helps improve writing by identifying and suggesting edits for common structural and rhetorical issues.

The quiet disappearance of the free-range childhood

https://bigthink.com/wp-content/uploads/2026/04/Screenshot-2026-04-16-at-10.39.53-AM.png?w=256&h=256&crop=1
Mallerie and Christopher's 6-year-old son was investigated for neglect after riding his scooter to a nearby playground unsupervised. A new Georgia law, "reasonable childhood independence," aims to prevent such investigations by setting a higher bar for neglect.

Hyperscalers have already outspent most famous US megaprojects

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

The simple geometry behind any road

https://sandboxspirit.com/_astro/circles.CshujFWj_Z1dkoK7.webp?dpl=dpl_7yBRDnY9mQCHx9XxEPrjXqyLjC41
The author explains how to generate smooth roads using lines and circular arcs by interpolating between abstract cross-sections called profiles, and describes a method to connect two profiles using a two-line fillet construction. The author also discusses how to handle edge cases, such as roads that shift or turn, by using cubic Hermite splines to find a good candidate position and ...

Show HN: PanicLock – Close your MacBook lid disable TouchID –> password unlock

https://raw.githubusercontent.com/paniclock/paniclock/main/assets/paniclock-logo-and-name-v1.png
PanicLock is a macOS utility that instantly locks the screen and disables Touch ID with a single click or laptop lid closure. It requires a one-time admin password setup to install a privileged helper tool.

Middle schooler finds coin from Troy in Berlin

A 13-year-old in Berlin discovered a 2,300-year-old bronze coin from ancient Troy, now on display at the PETRI Museum. The coin likely traveled along ancient trade routes, possibly kept as a charm or offering to the dead, rather than used for a business transaction.

NASA Force

https://nasaforce.gov/mission-image-1.webp
NASA Force is a hiring initiative for exceptional technologists to join NASA for 1-2 years, solving complex challenges in air and space. You'll work on real missions, take a systems approach, and contribute to advancing human spaceflight and scientific discovery.

Show HN: Sfsym – Export Apple SF Symbols as Vector SVG/PDF/PNG

https://raw.githubusercontent.com/yapstudios/sfsym/main/demo.svg
sfsym is a command-line tool for exporting Apple SF Symbols as SVG, PDF, or PNG. It reads vector paths directly from macOS's symbol renderer.

Landmark ancient-genome study shows surprise acceleration of human evolution

https://media.nature.com/lw767/magazine-assets/d41586-026-01204-5/d41586-026-01204-5_52289740.jpg
Researchers found 479 gene variants that evolved through natural selection in ancient people from western Eurasia after the dawn of agriculture, leading to widespread health changes in present-day populations. The study suggests human evolution accelerated over the past 10,000 years, particularly during the Bronze Age, with changes in genes linked to immunity, skin tone, and other traits.

NIST gives up enriching most CVEs

https://risky.biz/static/img/catalin-cimpanu.jpg
The US National Institute of Standards and Technology (NIST) has announced a new policy to prioritize only important vulnerabilities in the US National Vulnerability Database due to budget constraints. This decision is expected to impact the cybersecurity industry, with some companies relying on NIST's data for their vulnerability scanners and dashboards.

Loonies for Loongsons

https://www.leadedsolder.com/assets/loongson-board-in-ad.jpg
The user obtained a salvaged Loongson 3A5000-based motherboard from China and successfully installed Debian Linux on it, despite some initial issues with the UEFI shell and BIOS update. The user was able to benchmark the CPU and run various games, including Doom and Quake, on the system, which performed reasonably well considering its age and specifications.