Top stories

Tony Hoare has died
speckx about 8 hours ago

Tony Hoare has died

The article pays tribute to Tony Hoare, a pioneering computer scientist who made significant contributions to the field of programming languages, algorithms, and the theory of computation. It highlights Hoare's influential work, including the development of Quicksort and Communicating Sequential Processes, and his lasting impact on the computer science community.

blog.computationalcomplexity.org
1,298 179
Summary
After outages, Amazon to make senior engineers sign off on AI-assisted changes
ndr42 about 10 hours ago

After outages, Amazon to make senior engineers sign off on AI-assisted changes

https://www.ft.com/content/7cab4ec7-4712-4137-b602-119a44f77... (https://archive.ph/wXvF3)

https://twitter.com/lukolejnik/status/2031257644724342957 (https://xcancel.com/lukolejnik/status/2031257644724342957)

arstechnica.com
284 303
Summary
RISC-V Is Sloooow
todsacerdoti about 3 hours ago

RISC-V Is Sloooow

The article discusses the performance of RISC-V processors, noting that they can be significantly slower than other architectures, particularly in certain workloads. The author provides insights into the factors that can contribute to this performance difference and suggests areas for further optimization.

marcin.juszkiewicz.com.pl
107 87
Summary
Agents that run while I sleep
aray07 about 4 hours ago

Agents that run while I sleep

The article discusses the author's journey in developing autonomous software agents that can run and perform tasks while the user is away, allowing for more efficient and hands-off workflow management.

claudecodecamp.com
158 107
Summary
Yann LeCun raises $1B to build AI that understands the physical world
helloplanets about 14 hours ago

Yann LeCun raises $1B to build AI that understands the physical world

https://web.archive.org/web/20260310153721/https://www.wired...

https://www.ft.com/content/e5245ec3-1a58-4eff-ab58-480b6259a... (https://archive.md/5eZWq)

wired.com
252 292
Summary
naves about 4 hours ago

HyperCard discovery: Neuromancer, Count Zero, Mona Lisa Overdrive (2022)

https://web.archive.org/web/20230307111053/https://macintosh...

macintoshgarden.org
67 19
Summary
Launch HN: RunAnywhere (YC W26) – Faster AI Inference on Apple Silicon
sanchitmonga22 about 6 hours ago

Launch HN: RunAnywhere (YC W26) – Faster AI Inference on Apple Silicon

Hi HN, we're Sanchit and Shubham (YC W26). We built a fast inference engine for Apple Silicon. LLMs, speech-to-text, text-to-speech – MetalRT beats llama.cpp, Apple's MLX, Ollama, and sherpa-onnx on every modality we tested. Custom Metal shaders, no framework overhead.

Also, we've open-sourced RCLI, the fastest end-to-end voice AI pipeline on Apple Silicon. Mic to spoken response, entirely on-device. No cloud, no API keys.

To get started:

  brew tap RunanywhereAI/rcli https://github.com/RunanywhereAI/RCLI.git
  brew install rcli
  rcli setup   # downloads ~1 GB of models
  rcli         # interactive mode with push-to-talk
Or:

  curl -fsSL https://raw.githubusercontent.com/RunanywhereAI/RCLI/main/install.sh | bash
The numbers (M4 Max, 64 GB, reproducible via `rcli bench`):

LLM decode – 1.67x faster than llama.cpp, 1.19x faster than Apple MLX (same model files): - Qwen3-0.6B: 658 tok/s (vs mlx-lm 552, llama.cpp 295) - Qwen3-4B: 186 tok/s (vs mlx-lm 170, llama.cpp 87) - LFM2.5-1.2B: 570 tok/s (vs mlx-lm 509, llama.cpp 372) - Time-to-first-token: 6.6 ms

STT – 70 seconds of audio transcribed in *101 ms*. That's 714x real-time. 4.6x faster than mlx-whisper.

TTS – 178 ms synthesis. 2.8x faster than mlx-audio and sherpa-onnx.

We built this because demoing on-device AI is easy but shipping it is brutal. Voice is the hardest test: you're chaining STT, LLM, and TTS sequentially, and if any stage is slow, the user feels it. Most teams fall back to cloud APIs not because local models are bad, but because local inference infrastructure is.

The thing that's hard to solve is latency compounding. In a voice pipeline, you're stacking three models in sequence. If each adds 200ms, you're at 600ms before the user hears a word, and that feels broken. You can't optimize one stage and call it done. Every stage needs to be fast, on one device, with no network round-trip to hide behind.

We went straight to Metal. Custom GPU compute shaders, all memory pre-allocated at init (zero allocations during inference), and one unified engine for all three modalities instead of stitching separate runtimes together.

MetalRT is the first engine to handle all three modalities natively on Apple Silicon. Full methodology:

LLM benchmarks: https://www.runanywhere.ai/blog/metalrt-fastest-llm-decode-e...

Speech benchmarks: https://www.runanywhere.ai/blog/metalrt-speech-fastest-stt-t...

How: Most inference engines add layers between you and the GPU: graph schedulers, runtime dispatchers, memory managers. MetalRT skips all of it. Custom Metal compute shaders for quantized matmul, attention, and activation - compiled ahead of time, dispatched directly.

Voice Pipeline optimizations details: https://www.runanywhere.ai/blog/fastvoice-on-device-voice-ai... RAG optimizations: https://www.runanywhere.ai/blog/fastvoice-rag-on-device-retr...

RCLI is the open-source voice pipeline (MIT) built on MetalRT: three concurrent threads with lock-free ring buffers, double-buffered TTS, 38 macOS actions by voice, local RAG (~4 ms over 5K+ chunks), 20 hot-swappable models, and a full-screen TUI with per-op latency readouts. Falls back to llama.cpp when MetalRT isn't installed.

Source: https://github.com/RunanywhereAI/RCLI (MIT)

Demo: https://www.youtube.com/watch?v=eTYwkgNoaKg

What would you build if on-device AI were genuinely as fast as cloud?

github.com
159 73
Summary
jwilk about 8 hours ago

Debian decides not to decide on AI-generated contributions

The article discusses the recent changes to the Linux kernel's memory management system, with a focus on the new 'memleak' tracing feature that helps identify and fix kernel memory leaks. It also covers other improvements in areas like memory caching and page reclamation.

lwn.net
250 200
Summary
FFmpeg-over-IP – Connect to remote FFmpeg servers
steelbrain about 5 hours ago

FFmpeg-over-IP – Connect to remote FFmpeg servers

github.com
75 30
seanlinehan about 5 hours ago

Billion-Parameter Theories

The article explores the concept of complexity and its application in governing global systems. It examines how complex adaptive systems, such as the international political and economic landscape, require new approaches to policymaking and governance to effectively address emerging challenges.

worldgov.org
81 49
Summary
Levels of Agentic Engineering
bombastic311 about 14 hours ago

Levels of Agentic Engineering

The article discusses the levels of agentic engineering, outlining four distinct approaches: self-directed, collaborative, participatory, and emancipatory. It explores how these levels differ in terms of the degree of user autonomy and control over the design process.

bassimeledath.com
80 40
Summary
Redox OS has adopted a Certificate of Origin policy and a strict no-LLM policy
pjmlp about 14 hours ago

Redox OS has adopted a Certificate of Origin policy and a strict no-LLM policy

The article outlines the contribution guidelines for the Redox operating system project, covering topics such as reporting issues, submitting patches, and code of conduct expectations for contributors.

gitlab.redox-os.org
353 355
Summary
Intel Demos Chip to Compute with Encrypted Data
sohkamyung about 10 hours ago

Intel Demos Chip to Compute with Encrypted Data

The article discusses Intel's work on Fully Homomorphic Encryption (FHE), a cryptographic technique that allows data to be processed while it remains encrypted. This could enable cloud-based computation on sensitive data without compromising security and privacy.

spectrum.ieee.org
203 80
Summary
Brajeshwar 3 days ago

Exploring the ocean with Raspberry Pi–powered marine robots

This article explores how Raspberry Pi-powered marine robots are being used to study and monitor the ocean environment, collecting data on factors such as water temperature, pH, and currents to help understand and protect the world's oceans.

raspberrypi.com
22 3
Summary
maqnius 3 days ago

Invoker Commands API

The Invoker Commands API provides a way for web applications to communicate with external programs or services through a secure and standardized interface. This allows developers to extend the functionality of their web apps by integrating with other applications or services.

developer.mozilla.org
18 3
Summary
Open Weights isn't Open Training
addiefoote8 about 23 hours ago

Open Weights isn't Open Training

The article discusses the concept of open weights and open training, which involves making the underlying weights and models of AI systems publicly available. This approach aims to promote transparency, collaboration, and the advancement of AI technology.

workshoplabs.ai
68 19
Summary
bilsbie about 10 hours ago

Online age-verification tools for child safety are surveilling adults

The article discusses the growing concerns around child safety on social media and the internet, highlighting the potential use of AI-based surveillance and content moderation tools to monitor and restrict access for minors. It explores the challenges and ethical considerations surrounding these emerging technologies in the digital age.

cnbc.com
480 282
Summary
lukakopajtic about 13 hours ago

I put my whole life into a single database

howisfelix.today
402 189
Show HN: What's my JND? – a colour guessing game
Keithamus about 13 hours ago

Show HN: What's my JND? – a colour guessing game

https://www.keithcirkel.co.uk/too-much-color/

keithcirkel.co.uk
15 18
Summary
ibobev about 9 hours ago

Rebasing in Magit

The article discusses the Magit tool for managing Git repositories in Emacs. It explains the concept of rebasing and how to use Magit's interactive rebase feature to rewrite the commit history of a Git repository.

entropicthoughts.com
170 119
Summary
dnhkng about 10 hours ago

Show HN: How I Topped the HuggingFace Open LLM Leaderboard on Two Gaming GPUs

dnhkng.github.io
234 79
rosasalberto about 8 hours ago

Launch HN: Didit (YC W26) – Stripe for Identity Verification

Hi HN, I’m Alberto. I co-founded Didit (https://didit.me) with my identical twin brother Alejandro. We are building a unified identity layer—a single integration that handles KYC, AML, biometrics, authentication, and fraud prevention globally. Here’s a demo: https://www.youtube.com/watch?v=eTdcg7JCc4M&t=7s.

Being identical twins, we’ve spent our whole lives dealing with identity confusion, so it is a bit of irony that we ended up building a company to solve it for the internet.

Growing up in Barcelona, we spent years working on products where identity issues were a massive pain. We eventually realized that for most engineering teams, "global identity" is a fiction—in reality it is a fragmented mess. You end up stitching together one provider for US driver's licenses, another for NFC chip extraction in Europe, a third for AML screening, a fourth for government database validation in Brazil, a fifth for liveness detection on low-end Android devices, and yet another for biometric authentication and age estimation. Orchestrating these into a cohesive flow while adapting to localized regulations like GDPR or CCPA is a nightmare that makes no sense for most teams to be working on.

When we looked at the existing "enterprise" solutions, we were baffled. Most require a three-week sales cycle just to see a single page of documentation. Pricing is hidden behind "Contact Us" buttons, and the products themselves are often bloated legacy systems with high latency and abysmal accuracy.

We also noticed a recurring pattern: these tools are frequently optimized only for the latest iOS hardware, performing poorly on the mid-range or older Android devices that make up a huge percentage of the market. This results in a "leaky" funnel where legitimate users drop off due to technical friction and fraud goes undetected because data points are spread across disparate systems. Also, these systems are expensive, often requiring massive annual commits that price out early-stage startups.

We wanted to build a system that is accessible to everyone—a tool that works like Stripe for identity, where you can get a sandbox key in thirty seconds and start running real verifications with world-class UX and transparent pricing.

To solve this, we took the "delusional" path of full vertical integration. Rather than just wrapping existing APIs, we built our own ID verification and biometric AI models—from classification and fraud detection to OCR models for almost every language. This vertical integration is fundamental to how we handle user data. Because we own the entire stack, we control the flow of sensitive information from end-to-end. Your users' data doesn't get bounced around through a chain of third-party black boxes or regional middle-men. This allows us to provide a level of security and privacy that is impossible when you are just an orchestration layer for other people's APIs.

We believe that identity verification is one of the most critical problems on the internet, and must be solved correctly and ethically. Many people are rightfully skeptical, especially given recent news about projects that have turned identity into a tool for mass data collection or surveillance. We don’t do anything of the sort, but we also don’t want to be coerced in the future, so we facilitate data minimization on the customer side. Instead of a business asking for a full ID scan, we allow them to simply verify a specific attribute—like "is this person over 18?"—without ever seeing the document itself. Our goal is to move the industry away from data hoarding and toward zero knowledge, or at least minimal knowledge, verification.

The result of our all-in-one approach is a platform that increases onboarding rates while lowering identity costs. We’ve focused on building a high-confidence automated loop that reduces the need for manual review by up to 90%, catching sophisticated deepfakes and spoofing attempts that standard vision models miss. Our SDK is optimized for low bandwidth connections, ensuring it works on spotty 3G networks where legacy providers usually fail.

We are fully live, and you can jump into the dashboard at https://business.didit.me to see the workflow orchestration immediately. Our pricing is transparent and success-based; we don’t believe in hiding costs behind a sales call.

We’re here all day to answer any question—whether it’s about how we handle NFC verification, our approach to deepfake detection, the general ethics behind biometric data retention, or how we think about the future of identity. We’d love your brutal HN feedback on our APIs, platform, and integration flow!

48 45
mmayberry about 8 hours ago

Meta acquires Moltbook

https://web.archive.org/web/20260310154640/https://www.axios..., https://archive.ph/igqsh

https://www.reuters.com/business/meta-acquires-ai-agent-soci...

axios.com
357 226
Summary
GeneralMaximus about 6 hours ago

I built a programming language using Claude Code

This article explores the capabilities and limitations of the Claude programming language, a novel artificial intelligence-based language that aims to combine the flexibility of natural language with the precision of traditional programming languages.

ankursethi.com
94 132
Summary
Defeat as Method
akbarnama about 6 hours ago

Defeat as Method

cabinetmagazine.org
36 3
We are building data breach machines and nobody cares
idealloc_haris about 8 hours ago

We are building data breach machines and nobody cares

The article discusses the increasing prevalence of data breaches and the lack of public concern, arguing that we are creating 'data breach machines' through the extensive collection and storage of personal data by companies and organizations. It highlights the need for more robust security measures and greater accountability to protect individuals' privacy and data.

idealloc.me
75 23
Summary
I used pulsar detection techniques to turn a phone into a watch timegrapher
tylerjaywood 3 days ago

I used pulsar detection techniques to turn a phone into a watch timegrapher

The article discusses the use of a timegrapher, a tool that measures the accuracy and consistency of mechanical watches. It explains how the timegrapher works, the key metrics it provides, and how watchmakers and enthusiasts can use this information to optimize the performance of their timepieces.

chronolog.watch
60 25
Summary
janandonly 3 days ago

The Gervais Principle, or the Office According to “The Office” (2009)

The article explores the 'Gervais Principle', a framework for understanding office dynamics and power structures, based on the TV series 'The Office'. It examines how different types of employees - the sociopaths, the clueless, and the losers - interact and thrive (or not) within the corporate environment.

ribbonfarm.com
277 116
Summary
lukebechtel about 8 hours ago

Surpassing vLLM with a Generated Inference Stack

The article discusses the optimization of a client's website, Qwen3, by the digital agency Infinity. It highlights the challenges faced, the strategies implemented, and the significant improvements in website performance, user engagement, and conversion rates achieved through the optimization process.

infinity.inc
29 8
Summary
TigerUniversity about 3 hours ago

Iowa Payphone Defends Itself (Associated Press, 1984)

This article discusses a Iowa payphone owner who defended his business against claims that payphones were becoming obsolete due to the rise of cellphones in the 1980s. The payphone owner argued that payphones still served an important purpose for those without access to personal phones.

payphone-project.com
11 2
Summary