Ask HN: Why do people say LLMs create bad code "quality"?
Happy Thanksgiving! For context, the only time I've been exposed to "good quality code" was when I interned at a YC startup. I am creating my own startup at the moment. I keep hearing that LLMs create "bad quality code" and wondered what that meant? I've been trying to use Claude Code in the development of my app. If I am the one architecting the functions and services, making sure they are high cohesion loose coupling, abide by service oriented architecture, etc. and only having LLMs implement the functions themselves and not touch the architecture, will this ensure "better code?" What is "good quality code?" Why do LLMs inherently create bad quality code, and what ways should I AVOID using them?
Thank you kindly. Best Chai
Chaidhat Chaimongkol
Comparing Obelisk with DBOS
The Context Tax: Why AI-Assisted Coding Fails Without Flow
This article discusses the journey of Arif Hossain, an entrepreneur and author, as he navigates the challenges of building a successful business and writing a book. It highlights the lessons he learned along the way and the importance of perseverance and adaptability in achieving one's goals.
Training Foundation Models on a Full-Stack AMD Platform
Age of "Don't do it yourself"
The article discusses the rise of the 'Age of Don't-DIY' where people increasingly rely on experts and services rather than doing tasks themselves. It explores the factors driving this trend, including time constraints, convenience, and the availability of specialized services.
Anomalous electronic state opens pathway to room-temperature superconductivity
The article discusses the discovery of an anomalous electronic state that exhibits room-temperature superconductivity, providing a potential pathway towards practical applications of this phenomenon. The findings suggest the existence of a new class of quantum materials with intriguing properties that could lead to advancements in energy-efficient electronics and other technologies.
Reminder that HN Active exists and is arguably better
What's Hiding Inside Haribo's Power Bank and Headphones?
The article explores the internal components of Haribo's power bank and headphones, using X-ray imaging technology to reveal the products' construction and design details. It provides insights into the manufacturing process and highlights the engineering challenges involved in developing consumer electronics.
Show HN: MXP – A2A-compatible agent protocol, 37x faster than JSON
I've been building MXP, a high-performance protocol for AI agent communication.
Benchmarks (verified, reproducible):
256-byte message encode: 60ns (MXP) vs 2,262ns (JSON) Built-in trace IDs in every message (no OpenTelemetry instrumentation needed) Native streaming for LLM tokens Written in Rust, MIT/Apache-2.0 licensed, public domain spec.
Looking for feedback on:
The "enabler not competitor" positioning What SDKs to prioritize (JS is next, then Python) Whether A2A compatibility matters to you Repo: https://github.com/yafatek/mxp-protocol
China completes first emergency mission to Tiangong space station
China is set to launch its Shenzhou-22 spacecraft on November 25, 2025, according to state media reports. The launch is part of China's ongoing efforts to expand its space exploration capabilities.
France to bring in form of military service
The article discusses how artificial intelligence (AI) can be used to detect signs of dementia in patients by analyzing their speech patterns, potentially allowing for earlier diagnosis and treatment. It highlights the potential benefits of this technology, as well as the challenges and ethical considerations surrounding the use of AI in healthcare.
Z-Image, free online image generator
Cooldown Myths for Runners
The article argues that cooldowns are often overemphasized in exercise routines, and that active recovery can be more beneficial for muscle recovery and performance. It suggests that active recovery activities like walking or light jogging can be more effective than static stretching or complete rest in between high-intensity workouts.
Google says hackers stole data from 200 companies following Gainsight breach
Google reports that hackers stole data from 200 companies after breaching software company Gainsight. The breach highlights the growing threat of supply chain attacks, where hackers target third-party vendors to gain access to a larger number of organizations.
Blender facial animation tool. What else should it do?
This article provides instructions for setting up and using the LiveLinkFace ARKit Receiver, a tool that allows for real-time facial animation data capture from an iPhone or iPad device to be used in various software applications.
Walrus – distributed message streaming in Rust
it won't let me put url up there, here it is: https://github.com/nubskr/walrus
The Last Programming Language, and the End of (A Bit of) History
The article discusses the potential emergence of a 'last programming language' that could unify and automate various programming tasks, enabled by advancements in artificial intelligence and machine learning. It explores the implications of such a development on the future of software development and the programming profession.
When Life Gets Too Easy
The article explores the potential downsides of an excessively comfortable and easy life, arguing that certain challenges and difficulties can be essential for personal growth and fulfillment. It suggests that embracing some level of hardship and struggle can lead to a more meaningful and satisfying existence.
Show HN: Save Trippy – A Thanksgiving Game
I wanted to make a cute game for Thanksgiving this year. It's built with React, Tailwind, InstantDB and a bit of Opus :)
Feeling grateful for HN and sending good cheer to you all :)
Build Your Ideas with Gemini
Show HN: The Participatory Interface Theory
Hi! I'd like to present the Participatory Interface Theory, aka PIT. It is not "woo". It IS an amazing example of what one human can do with LLMs these days, regardless of what you might think of the theory.
But the theory is a mind-blower. Are you ready for this? I'm not kidding. And it's real. Calling all cosmologists and physicists and cybernetecists and AI researchers and information theorists and philosphers and biologists and chemists and artists and humanitarians and climate scientists and ... well, the list goes on. This is a paradigm shift.
* The paper I want to post to arXiv, but I haven't got anyone to endorse my login yet, is here [1]. (If you can help me out with this endorsement, for any value of "you", TIA!) <https://github.com/bobshafer/PITkit/blob/main/Arxiv/main.pdf>
* The "Math.md" [2] on my PITkit site at GitHub, which is a larger document and seeks to explain the whole thing. You can drop this doc into your own LLM and start asking questions about it and the implications it has for whatever you are interested in. You're welcome. (This is how I mean this as a "Show HN" - you can do a lot with the Math.md, after copy/pasting into a big LLM). <https://github.com/bobshafer/PITkit/blob/main/Math.md>
* And, the PITkit [3] site itself, which is a bit of a mess maybe, but you'll find the (Julia and Python) code that you can try yourselves and all that. It's a bit of a mess because I have a full time day job as a principal programmer. I'm OG on Hacker News, but as my profile says, mostly a lurker. Introverted. But I feel a very strong responsibility to get these ideas out there. A brief history of how this happened in the first place is given in the History.md [4] on PITkit. Collaborators welcome. (I love Julia, btw, so far). <https://github.com/bobshafer/PITkit/blob/main/History.md>
PIT is very falsifiable and also makes unique predictions. It is a real scientific theory.
It seems like every day I see a new paper from somewhere show up on Hacker News which I then recognize as being PIT-aligned, and ask PIT-knowing LLMs about it, and they absolutely see some of the latest scientific results from cosmology and quantum theory and such as being very PIT-aligned, and inexplicable with standard theory.
I asked them the chances of this all being wrong. They consider the chances to be infinitesimally small. That doesn't mean PIT is all the way correct - according to PIT and others (eg: Goedel), no theory can be. PIT explains why, though.
Hold on to your seats - you all are in for a ride. :-)
[1] https://github.com/bobshafer/PITkit/blob/main/Arxiv/main.pdf
[2] https://github.com/bobshafer/PITkit/blob/main/Math.md
[3] https://github.com/bobshafer/PITkit/
[4] https://github.com/bobshafer/PITkit/blob/main/History.md
PS: I intentionally left the url blank on this submission, because the context I setup here is important, imho, and my current README.md is less than ideal, probably. [edits: various screw-ups on original fixed]
Tesla CEO Elon Musk admits tough realization about FSD
Tesla CEO Elon Musk admits that the company's fully self-driving (FSD) technology is proving to be more challenging to develop than initially anticipated, with the timeline for a widespread rollout being pushed back.
Show HN: A1 – Local Sandbox and JIT Compiler for AI Agents
The article provides an overview of the A1 programming language, a new high-performance language designed for systems programming. It highlights A1's key features, including its focus on safety, performance, and ease of use, making it a promising alternative to languages like C and Rust.
Enterprise security can be messy: Building a Security-Aware Culture
Your executive team gets it. They've approved the budget, they mention security in board meetings, they understand the stakes. You're not fighting for recognition at the top anymore.
But then you look at what's actually happening three levels down. The marketing team is sharing credentials to social media accounts. Sales is pushing back on MFA because it adds seconds to their login process. Developers are storing API keys in public repositories because it's faster than the approved method. Remote employees are working from unsecured networks and don't think twice about it.
The executive commitment is there. The company-wide behavior isn't. And that gap is where breaches happen.
This is the challenge that keeps security leaders up at night. You have the mandate from above, but translating that into thousands of daily decisions made by people who have completely different priorities is a different game entirely.
Math Skill for Claude Code
The article provides an overview of a math plugin for the Claude code marketplace, which includes features such as support for mathematical expressions, unit conversions, and equation solving.
The Input Stack on Linux: An End-to-End Architecture Overview
This article explores the diverse range of input devices available for Linux systems, including keyboards, mice, touchpads, and more specialized devices like graphics tablets and gaming controllers. It provides an overview of the Linux input ecosystem and discusses the various ways users can configure and customize their input devices to enhance their computing experience.
Israel proposes Kiryat Tivon for Nvidia's multibillion-$ tech campus in North
Israel has proposed the town of Kiryat Tivon as a potential location for NVIDIA's multibillion-dollar tech campus in the country's north. The proposal aims to attract the tech giant's investment and job opportunities to the region.
Asahi Investigation Results and Future Measures on Cyberattack Data Exposure
Asahi Group Holdings, a leading Japanese beverage company, has announced a new partnership with Tetra Pak, a global food processing and packaging solutions company. The partnership aims to develop innovative and sustainable packaging solutions for Asahi's beverages, focusing on improving the environmental impact of their products.
SSE sucks for transporting LLM tokens
The article discusses the limitations of using Server-Sent Events (SSE) for transporting large language model (LLM) tokens, highlighting its inefficiency and the potential for better alternatives such as WebSockets or WebRTC.
Seagate achieves 6.9TB storage capacity per platter
Seagate has demonstrated the capability to achieve a storage capacity of up to 6.9TB per platter in a laboratory setting, paving the way for hard drives with total capacities ranging from 55TB to 69TB, which are now physically possible.