- OpenAI – How to delete your account (help.openai.com)delete openai accountaccount deletioncancel subscription
- Unsloth Dynamic 2.0 GGUFs (unsloth.ai)artificial intelligencemachine learningggufs
- We Will Not Be Divided (notdivided.org)unitycommunitysocialjustice
- artificial intelligencemilitary technologygovernment contracts
- age verificationonline safetycalifornia gaming laws
- The Eternal Promise: A History of Attempts to Eliminate Programmers (www.ivanturkovic.com)
- OpenAI raises $110B on $730B pre-money valuation (techcrunch.com)artificial intelligenceventure capitalfunding
- Cash issuing terminals (computer.rip)atm machinescashless paymentspoint of sale systems
- middle east conflictisrael-iran relationsglobal security crisis
- Croatia declared free of landmines after 31 years (glashrvatske.hrt.hr)landmine removalcroatia newsmine clearance
- SHELL: Global Tool for Calling and Chaining Procedures in the System (1965) [pdf] (people.csail.mit.edu)
- Statement on the comments from Secretary of War Pete Hegseth (www.anthropic.com)lost in spacespace explorationcosmic mysteries
- Qt45: A small polymerase ribozyme that can synthesize itself (www.science.org)polymerase ribozymeself-synthesizingdna synthesis
- A better streams API is possible for JavaScript (blog.cloudflare.com)javascriptstreams apiweb development
- NASA announces overhaul of Artemis program amid safety concerns, delays (www.cbsnews.com)artemis programnasa overhaulspace exploration
- Inferring car movement patterns from passive TPMS measurements (dspace.networks.imdea.org)car movement patternstpms measurementstraffic monitoring
- Bootc and OSTree: Modernizing Linux System Deployment (a-cup-of.coffee)linux system deploymentbootstrappingostree
- chinese officialchatgptgovernment surveillance
- open-sourcecalculator-firmwareage-verification
- Time-Travel Debugging: Replaying Production Bugs Locally (lackofimagination.org)
- A Fuzzer for the Toy Optimizer (bernsteinbear.com)
- Eschewing Zshell for Emacs Shell (2014) (www.howardism.org)
- Don't use passkeys for encrypting user data (blog.timcappalli.me)passkey security risksencryption methodspassword alternatives
- Can you reverse engineer our neural network? (blog.janestreet.com)
- file recoveryclaude sessiondotfile
- We gave terabytes of CI logs to an LLM (www.mendral.com)machine learningnatural language processinglog analysis
- version controlcommit historysoftware development