| News Nug |
|---|
|
80386 Protection Published: 2026-02-24 | Origin: Hacker News The content discusses the author's experiments with retro gaming and computing, specifically focusing on building an 80386-compatible core using SystemVerilog. The latest blog post compares the 80386's capabilities to the earlier 80286, particularly in terms of memory protection. While the 80286's Protected Mode was complex and not widely adopted, the 80386 introduced enhancements that made it more usable, such as paging, a flat 32-bit address space, and the ability to run DOS programs within a |
|
RFC 406i: The Rejection of Artificially Generated Slop (RAGS) Published: 2026-02-24 | Origin: /r/programming This document outlines the protocol for handling low-quality, machine-generated contributions to source code repositories and other similar platforms. It indicates that such submissions will typically trigger automated or manual defenses, resulting in rejection by maintainers who may find them unworthy of review. The document emphasizes the use of specific terms to convey the level of undesirability of the submission. The authors criticize poor prompt engineering and indicate that the automated nature of the contribution does not meet the standards expected. The message stresses that project maintainers and |
|
Row Locks With Joins Can Produce Surprising Results in PostgreSQL Published: 2026-02-24 | Origin: /r/programming The article presents a database riddle involving two tables connected by a foreign key constraint, where executing a join results in no records being returned despite the foreign key being not null and valid. This paradox raises questions about row locks and joins, revealing that under certain circumstances, they can lead to unexpected results. The scenario is illustrated with an example from a DMV system managing car ownership, where a single car owned by "haki" can be transferred to another owner, like "jerry." The process involves |
|
Show HN: enveil – hide your .env secrets from prAIng eyes Published: 2026-02-24 | Origin: Hacker News The content discusses the enveil project, which provides a solution for securely managing .env files by hiding sensitive secrets from AI coding tools and accidental exposure. It emphasizes that plaintext secrets are never stored on disk; instead, they reside in an encrypted local store and are injected into applications at runtime. This approach prevents accidental disclosure of secrets, a problem that has been encountered with tools like Claude Code, Copilot, and Cursor. Inspired by a previous solution using 1Password, the author created enveil as |
|
[Mock the hype post] The Software Development Lifecycle Is Dead | Boris Tane Published: 2026-02-24 | Origin: /r/programming The article argues that AI agents have fundamentally changed the software development lifecycle (SDLC), essentially leading to its collapse rather than enhancing its efficiency. Traditionally, the SDLC involved distinct, sequential stages each with specialized tools and processes, such as Jira for requirements and GitHub for code review. However, with the advent of coding agents, these stages have merged into a continuous cycle of intent, context, and iteration. Engineers who began working after such tools were introduced often lack familiarity with traditional SDLC |
|
Apache NetBeans 29 released. Published: 2026-02-24 | Origin: /r/programming Apache NetBeans 29 was released on February 23, 2026. It is available in a binary format (netbeans-29-bin.zip) and as a source package (netbeans-29-source.zip), both of which include SHA-512 and PGP ASC files for verification. Codelerity packages for Windows, macOS, and Linux are also available, all bundled with a local Temurin JDK for an out-of-the-box experience. The IDE supports JDK 25 |
|
Blood test boosts Alzheimer's diagnosis accuracy to 94.5%, clinical study shows Published: 2026-02-24 | Origin: Hacker News Failed to fetch content - HTTP Status - 400 |
|
Show HN: X86CSS – An x86 CPU emulator written in CSS Published: 2026-02-24 | Origin: Hacker News Lyra Rebane presents x86CSS, a CSS-only implementation of an x86 CPU/emulator that operates without JavaScript. The demonstration shows a C program compiled into 8086 machine code running entirely in CSS. While a script tag is included for a clock for stability and speed, the program can run without it, relying solely on CSS, including a JS-less clock implementation. The clock uses CSS animations and container queries to operate without user interaction, in contrast to other methods that require mouse interaction |
|
C Enum Sizes; or, How MSVC Ignores The Standard Once Again Published: 2026-02-24 | Origin: /r/programming The post discusses a bug related to enumeration types in the C programming language. The author noticed that while working with enums, the underlying type of the enumerators can be either explicitly specified or inferred by the compiler. According to the C standard, if the type isn't specified, the compiler may choose a compatible underlying type, such as char or an integer type. The author highlights that different compilers have different behaviors regarding the underlying type. For example, GCC expands the underlying type to 64 bits when necessary |
|
Show HN: Steerling-8B, a language model that can explain any token it generates Published: 2026-02-24 | Origin: Hacker News The Steerling-8B model is a groundbreaking language model that can trace any generated token back to its input context, understandable concepts, and its training data. Trained on 1.35 trillion tokens, it achieves performance comparable to models trained on significantly more data (2–7 times). Key features include the ability to manipulate specific concepts during inference without requiring retraining, ensuring training data transparency for generated outputs, and employing concept control for safer outputs. This model uniquely explains each token it |
|
I Ported Coreboot to the ThinkPad X270 Published: 2026-02-23 | Origin: Hacker News In a post dated February 18, 2026, the author shared their commitment to porting coreboot and libreboot to the X270 laptop. Within a week, they successfully accomplished this task. The X270 model they worked on features a Kaby Lake CPU. The author began by dumping the BIOS image from the laptop, using a pico-serprog setup on an RP2040-zero and flashprog to interact with the SPI flash. During the process of working on the laptop, the author |
|
RubyLLM::MCP has move to 1.0 🎉 Published: 2026-02-23 | Origin: /r/ruby The team takes user feedback seriously and encourages users to check their documentation for available qualifiers. They have released version 1.0.0 of RubyLLM::MCP, marking a transition to a more stable, production-ready phase aligned with the MCP protocol. This update enhances API stability and provides foundational components for a strong MCP experience, facilitating diverse connectivity options for developers. The project aims to implement MCP features in Ruby while integrating smoothly with the RubyLLM DSL. Contributors @trevorturk and |
|
Making Wolfram Tech Available as a Foundation Tool for LLM Systems Published: 2026-02-23 | Origin: Hacker News Large Language Models (LLMs) are impressive and useful but lack precision and deep computational capabilities. To supplement LLMs, a foundation tool is required—one that offers deep computation and precise knowledge, like the Wolfram Language, which has been developed over the past 40 years. The Wolfram Language aims to make as much knowledge computable as possible, integrating algorithms, methods, and data for accurate computation. This technology not only benefits humans but can now enhance LLMs as well. By |
|
UNIX99, a UNIX-like OS for the TI-99/4A (2025) Published: 2026-02-23 | Origin: Hacker News Failed to fetch content - HTTP Status - 403 |
|
How I ported Doom to a 20-year-old VoIP phone Published: 2026-02-23 | Origin: /r/programming The post discusses the author's experience with repurposing old Snom 360 VoIP phones, which were given to them after being phased out at their previous job. Initially, the author intended to set up an Asterisk PBX with these phones. However, while upgrading the firmware on one of the devices, they had the idea to try running Doom on it, given that the phone had a screen and keyboard. To start, the author downloaded the latest firmware from Snom's archive (V |
|
Git's Magic Files Published: 2026-02-23 | Origin: /r/programming The content discusses the functionality of special files in Git repositories that influence Git's behavior. Key points include: - Git looks for specific committed files that control its configuration, rather than just relying on .git/ configuration files. - The .gitignore file, along with .git/info/exclude and a global ignore file, defines files and patterns that Git should not track, allowing for the use of wildcards and negation. - Patterns in .gitignore only affect untracked files; existing tracked |
|
Terence Tao, at 8 years old (1984) [pdf] Published: 2026-02-23 | Origin: Hacker News The provided content appears to be a portion of a PDF file in its raw format, indicating the structure of the PDF along with various objects such as metadata, pages, and content streams. The excerpt includes details about the document's linearization, cross-reference table, and additional metadata, as well as references to encoding and content filters for graphical elements and text. It focuses on the technical specifications required to render the PDF, rather than any specific textual or visual content from within the document itself. |
|
Code isn’t what’s slowing projects down Published: 2026-02-23 | Origin: /r/programming Marek Sontag discusses the contrast between solo programming or working in small, familiar teams versus collaborating in larger or unfamiliar environments. In solo projects, ideas can quickly turn into code and be shared on platforms like GitHub with minimal friction. However, once a programmer enters a more structured workplace, the process becomes complicated. Tasks are refined, added to sprints, and involve multiple steps including pull requests and testing, which slows down implementation. Sontag highlights that while working alone or with a |
|
The Age Verification Trap: Verifying age undermines everyone's data protection Published: 2026-02-23 | Origin: Hacker News Waydell D. Carvalho argues that age verification for social media users undermines data protection. With growing concerns about adolescent mental health and harmful content, lawmakers are proposing minimum age restrictions, typically set at 13 or 16. However, enforcing these age limits requires platforms to collect personal data to confirm users' ages, leading to conflicts with modern data privacy laws. Carvalho identifies a dilemma where strong age-verification enforcement compromises user privacy. The typical framework for age-restriction laws demands platforms take reasonable |
|
Dictionary Compression is finally here, and it's ridiculously good Published: 2026-02-23 | Origin: /r/programming The content discusses the potential of dictionary compression to significantly reduce data transmission sizes over the web. This technique, which has gained support, allows applications to send data more efficiently. Initial tests show a dramatic reduction in file sizes; for instance, YouTube's JavaScript downloads for returning desktop users can shrink by up to 90%, while the HTML for Google search results may condense by nearly 50%. The method works by utilizing a predefined dictionary of known data, enabling the compression process to refer to existing |