| News Nug |
|---|
|
PostgresBench: A Reproducible Benchmark for Postgres Services Published: 2026-04-03 | Origin: /r/programming The content discusses the focus on building high-performance systems, highlighting ClickHouse as an example where performance is a core design goal. It emphasizes a similar approach in developing a managed Postgres service, engineered to be one of the fastest available. ClickHouse and Postgres together create a unified data stack suitable for SaaS and AI applications. To compare managed Postgres services, the authors created PostgresBench, utilizing a transparent and reproducible benchmarking methodology akin to ClickBench, which benchmarks over 40 databases |
|
Artemis II crew take “spectacular” image of Earth Published: 2026-04-03 | Origin: Hacker News NASA has released the first high-resolution images of Earth taken by the crew of Artemis II during their mission around the Moon. Commander Reid Wiseman captured these images after the team completed a trans-lunar injection burn, setting them on a path to the Moon. One of the images, dubbed "Hello, World," shows the Atlantic Ocean with the Earth appearing upside down, featuring the western Sahara and the Iberian Peninsula on the left and eastern South America on the right, with Venus visible in the screenshot. |
|
Someone is actively publishing malicious packages targeting the Strapi plugin ecosystem right now Published: 2026-04-03 | Origin: /r/programming The content outlines a comprehensive security strategy for managing dependencies in software development, particularly focusing on AI coding agents. Key points include: - Scanning and governing dependencies during pull requests and builds. - Blocking malicious packages before they can enter the codebase during installation. - Generating AI-enhanced Bill of Materials (BOMs) using concrete code evidence, not just manifests. - Monitoring all actions taken by AI coding agents. - Maintaining visibility of all AI tools and SDKs in the organization to prevent blind |
|
iNaturalist Published: 2026-04-03 | Origin: Hacker News The content encourages individuals to explore and document their observations of the natural world, contributing to biodiversity science. Users can record their findings, share with fellow naturalists, and discuss their observations, which are then shared with scientific data repositories like the Global Biodiversity Information Facility. The initiative allows users to track encounters with various species, connect with experts, and participate in or create projects related to biodiversity. Additionally, it promotes community engagement through events and discussions among naturalists. Mobile apps are available for easy observation, |
|
OpenClaw privilege escalation vulnerability Published: 2026-04-03 | Origin: Hacker News The content discusses a potential security issue and redirects users to the official NVD (National Vulnerability Database) website, which requires JavaScript for full functionality. It emphasizes that .gov websites are official U.S. government sites and should be securely accessed via HTTPS. The NVD Dashboard provides various resources and tools including news updates, statistics, and vulnerability searches, along with references to different versions of the CVSS (Common Vulnerability Scoring System) calculators and other related topics. Additionally, it mentions a |
|
Where is every byte? Published: 2026-04-03 | Origin: /r/programming The author investigated memory spikes in a Node.js server and streamlined the exploration by analyzing a simpler Python HTTP server using `python3 -m http.server`. Initially consuming 19 MiB of resident memory, the author examined the kernel's `/proc/pid/maps`, which details the virtual memory regions allocated to processes. Each line in this file shows a memory address range, permissions, an offset, a device ID, an inode, and sometimes a filename. An example line from the mappings was broken down: |
|
Using CEL's now() to enforce dependency cooldown periods - block packages published in the last N hours Published: 2026-04-03 | Origin: /r/programming The content outlines a security workflow for managing dependencies and mitigating risks from malicious packages in software development. Key features include: - Scanning and governing dependencies for every pull request (PR) and build. - Blocking malicious packages at the time of installation to prevent them from entering the codebase. - Generating Bill of Materials (BOMs) that are enriched with AI insights based on actual code evidence rather than just manifest data. - Monitoring actions taken by AI coding agents across projects and workflows. - Ens |
|
Building DNS query tool from scratch using C Published: 2026-04-03 | Origin: /r/programming Failed to fetch content - HTTP Status - 403 |
|
Idiomatic Lisp and the nbody benchmark Published: 2026-04-03 | Origin: /r/programming The excerpt discusses the philosophy among Lisp programmers of adapting the language to fit specific problems rather than forcing problems to fit within the constraints of Lisp. The author seeks a concrete example of this philosophy in action and highlights an interaction between prominent Lisp programmer @Ngnghm and a new language, Koru, represented by @korulang. The discussion centered around the performance of Lisp in comparison to C, particularly in the context of a benchmark called the "nbody" benchmark. @korulang suggested using this benchmark |
|
Post Mortem: axios NPM supply chain compromise Published: 2026-04-03 | Origin: Hacker News On March 31, 2026, two malicious versions of the axios library (1.14.1 and 0.30.4) were published to the npm registry via a compromised account, introducing a dependency known as [email protected], which installed a remote access trojan on various operating systems. These versions were available for approximately three hours before being removed. Users are advised to check their lockfiles and treat any compromised machines accordingly, especially if they installed |
|
How to build .NET obfuscator - Part I Published: 2026-04-02 | Origin: /r/programming The content discusses a series on building .NET obfuscators, emphasizing the techniques relevant to C#. It suggests that readers should have a basic understanding of C#, the ECMA-335 specification, and the dnlib library for metadata modification. Familiarity with stack virtual machines and IL opcodes is also recommended, and a cheatsheet is provided for essential instructions related to stack operations, comparisons, and method calls. The author notes that .NET metadata can be likened to database tables and mentions a tool |
|
Towards an Amicable Resolution with Ruby Central Published: 2026-04-02 | Origin: /r/ruby On April 2, 2026, three members of Ruby Central's board released statements regarding RubyGems and Bundler. They published an incident report detailing last year's events and announced the completion of a third audit of RubyGems.org's infrastructure, which found no evidence of compromised user data or service integrity. The board acknowledged their communication failures with former maintainers that contributed to confusion and frustration within the community. They expressed a commitment to resolve disputes amicably. The former maintainer declared a |
|
Sidekiq to Temporal: a zero-downtime migration strategy Published: 2026-04-02 | Origin: /r/ruby FireHydrant, recently acquired by Freshworks, is an incident management platform that focuses on helping businesses improve their response to incidents and operational reliability. Key features include quickstart guides, integrations with various tools, comprehensive documentation, an API reference for programmatic interaction, and customer stories highlighting successful incident management. Their blog offers insights on incidents and reliability, while guides and events provide best practices. The platform has evolved its runbook automation, enabling customers to manage incidents more effectively and efficiently. FireHydrant uses |
|
soak testing a desktop app in zig Published: 2026-04-02 | Origin: /r/programming Failed to fetch content - HTTP Status - 403 |
|
Tailscale's new macOS home Published: 2026-04-02 | Origin: Hacker News Tailscale is a networking service that facilitates seamless device connectivity. It recently updated its product offerings, including Aperture, which focuses on unified AI governance. The Winter Update highlights enhancements in various features like Peer Relays and Services. Tailscale also hosts events, such as TailscaleUp, aimed at engineering, security, and IT leaders, and offers partnership opportunities. A recent issue on some MacBooks involved Tailscale’s icon disappearing behind the notch on newer models' displays, making it |
|
Cursor 3 Published: 2026-04-02 | Origin: Hacker News Software development is evolving, and Cursor is adapting to these changes. Over the past year, the transition from manual file editing to using agents that autonomously write code is underway, marking a shift to the third era of software development. Despite this progress, engineers find themselves still managing individual agents and multitasking across various tools. To streamline this process, Cursor is launching Cursor 3, a unified workspace designed for working with agents. This new interface enables a higher level of abstraction while still allowing deeper exploration when |
|
Good ideas do not need lots of lies in order to gain public acceptance (2008) Published: 2026-04-02 | Origin: Hacker News The content discusses a minor change to the comments section of a website that no longer includes pop-up links. It questions whether this adjustment addresses the issue of comments not appearing on permalinked posts, concluding that it appears not to help. The text also lists a variety of individuals and their associated fields, alongside humorous remarks and references to various personas, including a mix of political figures and creative professionals. Additionally, it encourages readers who may not appreciate the "Daniel Davies" website to remain open to other related content |
|
Google releases Gemma 4 open models Published: 2026-04-02 | Origin: Hacker News The content discusses the capabilities of Gemma 4, a model designed for mobile and IoT devices as well as personal computers. It emphasizes the ability to create autonomous agents that can perform tasks using function calling, develop applications with advanced audio and visual capabilities, and offer multilingual support that understands cultural nuances. Users can enhance performance by training Gemma with preferred frameworks and run models on their own hardware for efficient deployment. The models have been rigorously evaluated against various data sets to ensure quality, and they adhere |
|
Decisions that eroded trust in Azure – by a former Azure Core engineer Published: 2026-04-02 | Origin: Hacker News The article begins a series discussing a significant misstep by Microsoft that nearly cost them OpenAI, their largest customer, as well as the trust of the US government. The author, who joined Azure Core on May 1, 2023, brings a wealth of experience to the role, having been involved with Azure since its inception in 2010 and having held various positions at Microsoft, including work on Windows, SharePoint Online, and core operating system technologies. The author has also played a key |
|
Bringing Clojure programming to Enterprise Published: 2026-04-02 | Origin: /r/programming The blog post discusses the author's decision to use Clojure, a dialect of LISP, for developing a reference data system in the manufacturing domain. Initially skeptical about moving away from standard development languages like Java, the author came to appreciate Clojure's advantages, including its dynamic functional programming features and immutable data structures. Clojure runs on the Java Virtual Machine, providing a rich ecosystem of libraries and tools that facilitate complex data manipulation. Despite being created in 2007 and often regarded as a |