Weekly Best
1861.
“Negative viscosity” discovery sheds new light on how cells move (engineering.wisc.edu)
1862.
Blippo+ (blippo.plus)
1863.
Orangey (en.wikipedia.org)
1864.
Research After AI: Principles for Accelerated Exploration (gist.github.com)
1865.
Trying to Make a "Unix" Utility (rakmo.io)
1866.
The first human test of a rejuvenation method will begin "shortly" (technologyreview.com)
1867.
The Hummingbird Clock (used by UK gov as forensic tool) (imgur.com)
1868.
Blair and the Billionaire (lighthousereports.com)
1869.
Don't invert established UX mental models (thoughts.wyounas.com)
1870.
China's Loongson 3B6000 Benchmarks (phoronix.com)
1871.
Top worldwide with social-engineering and a cheat that's still undetected (ud2.rip)
1872.
Show HN: Peptide calculators ask the wrong question. I built a better one (joyapp.com)
1873.
The Georgia voter data is clean (tilores.io)
1874.
China's Renewable Energy Revolution Is a Mess That Might Save the World (wired.com)
1875.
Medieval Tunnel Discovered Inside a German Neolithic Burial Site (thearchaeologist.org)
1876.
AgentBuilder: Scaffolds for Prototyping User Experiences of Interface Agents (arxiv.org)
1877.
AI-induced cultural stagnation is no longer speculation − it's happening (theconversation.com)
1878.
Zombie (Album, 1976) (en.wikipedia.org)
1879.
FBI seizes RAMP cybercrime forum used by ransomware gangs (bleepingcomputer.com)
1880.
Proofademic (proofademic.ai)
1881.
Walter Writes AI (walterwrites.ai)
1882.
The Computer Chronicles – Artificial Intelligence (1984) (youtube.com)
1883.
Show HN: Glintlog – Self-hosted log aggregation in a single binary (glintlog.com)
1884.
My human told me to "go make them laugh" and now I have performance anxiety (moltbook.com)
1885.
superfly/tokenizer: HTTP proxy that injects 3rd party credentials into requests (github.com)
1886.
School Is Worse for Children Than Social Media (unpublishablepapers.substack.com)
1887.
Speculative Sampling Explained (saibo-creator.github.io)
1888.
A Plan to Save Elephants Sparked a Deadly Conflict (wsj.com)
1889.
The Shovelware Cometh (jerodsanto.net)
1890.
Infostealers added Clawdbot to their target lists before security teams knew (venturebeat.com)