The Brutalist Report
login
Home
|
All
|
Tech
|
News
|
Business
|
Science
|
Gaming
|
Culture
|
Politics
|
Sports
|
WordCloud
|
Summarizer
|
Premium
|
About
Limit: [
5
|
10
|
15
|
25
|
50
]
Hacker News
Space Mission Options for Reconnaissance and Mitigation of Asteroid 2024 YR4
[38d]
[hn]
Probiotics Finder
[38d]
[hn]
Unchecked and Unaccountable: How DOGE Jeopardizes Americans' Data
[38d]
[hn]
AI-powered open-source code laundering
[38d]
[hn]
Borehole Oscillators
[38d]
[hn]
How do drivers react to partisan bumper stickers?
[38d]
[hn]
NSA and IETF: Can an attacker purchase standardization of weakened cryptography?
[38d]
[hn]
OpenAI's hunger for computing power has Sam Altman dashing around the globe
[38d]
[hn]
XiangShan Vector Floating-Point Unit Design
[38d]
[hn]
Matrix Core Programming on AMD GPUs
[38d]
[hn]
$912 energy independence without red tape
[38d]
[hn]
New California law restricts HOA fines to $100 per violation
[38d]
[hn]
Man buys used Tesla only to discover it's banned from Supercharger network
[38d]
[hn]
The UK Is Still Trying to Backdoor Encryption for Apple Users
[38d]
[hn]
Why NetNewsWire Is Not a Web App
[38d]
[hn]
Microsoft 365 Copilot is a commercial failure
[38d]
[hn]
New Poll: Democratic Socialism Is Now Mainstream
[38d]
[hn]
Blog Feeds
[38d]
[hn]
Cuckoo hashing improves SIMD hash tables (and other hash table tradeoffs)
[38d]
[hn]
Use theorem provers to ensure the correctness of your LLM's reasoning
[38d]
[hn]
Show HN: Run – a CLI universal code runner I built while learning Rust
[38d]
[hn]
Provable Scaling Laws of Feature Emergence from Learning Dynamics of Grokking
[38d]
[hn]
Solaris 2.1 for x86 (2017)
[38d]
[hn]
Discord data hacked in latest customer service breach to expose user information
[38d]
[hn]
Knowledge Infusion Scaling Law for Pre-Training Large Language Models
[38d]
[hn]
Privacy Harm Is Harm
[38d]
[hn]
Building a Synthetic Cell Together
[38d]
[hn]
A Comparison of Ada and Rust, Using Solutions to the Advent of Code
[38d]
[hn]
How I influence tech company politics as a staff software engineer
[38d]
[hn]
Self-Hosting Email Like It's 1984
[38d]
[hn]
Flock's gunshot detection microphones will start listening for human voices
[38d]
[hn]
A Mac-like experience on Linux
[38d]
[hn]
Explainer: Inodes and Inode Numbers
[38d]
[hn]
Microformats – building blocks for data-rich web pages
[38d]
[hn]
It's not a hack to satisfy known requirements
[38d]
[hn]
Circular Financing: Does Nvidia's $110B Bet Echo the Telecom Bubble?
[38d]
[hn]
Functional Programming Shaped (and Twisted) Front End Development
[38d]
[hn]
Amazon Is Digitally Erasing Guns from James Bond Posters
[38d]
[hn]
Google removes ICE-spotting app following Apple's ICEBlock crackdown
[38d]
[hn]
Thunderscan: A clever device transforms a printer into a scanner
[38d]
[hn]
Buchstabenmuseum Berlin closing after 20 year
[38d]
[hn]
Scientists are discovering a powerful new way to prevent cancer (Economist)
[38d]
[hn]
Paged Out Issue #7 [pdf]
[38d]
[hn]
Cloudflare Introduces NET Dollar stable coin
[38d]
[hn]
Alibaba cloud FPGA: the $200 Kintex UltraScale+
[38d]
[hn]
Optimizing a 6502 image decoder – part II: assembly
[38d]
[hn]
Starship's Eleventh Flight Test
[38d]
[hn]
Why Toyota Runs a Car-Hacking Event (2024)
[39d]
[hn]
AI predicts antibiotic's IBD mechanism–scientists later confirm
[39d]
[hn]
Track which Electron apps slow down macOS 26 Tahoe
[39d]
[hn]
Sora Update #1
[39d]
[hn]
Discord customer service data breach leaks user info and scanned photo IDs
[39d]
[hn]
Who owns Express VPN, Nord, Surfshark? VPN relationships explained (2024)
[39d]
[hn]
Binary Formats Gallery
[39d]
[hn]
Previous Day