August 2024 Archive
961.
Rodney Brooks’s Three Laws of Robotics (spectrum.ieee.org)
962.
Launch HN: Moonglow (YC S24) – Serverless Jupyter Notebooks
963.
How to talk to your parents about hardware memory safety (cheriot.org)
964.
SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level (simonwillison.net)
965.
Abel, the Mozart of Mathematics (privatdozent.co)
966.
Reversing the AMD Secure Processor (PSP) – Part 2: Cryptographic Co-Processor (dayzerosec.com)
967.
Deepwater Sub Recovers Roman Battering Ram Used in Carthage in Punic Wars Battle (gizmodo.com)
968.
Open source tools to query OpenStreetMap (wcedmisten.fyi)
969.
Parents outraged at Snoo after smart bassinet company charges fee to rock crib (independent.co.uk)
970.
FreeBSD considers Rust in the base system (lwn.net)
971.
Crypto 'pig butchering' scam wrecks bank, sends ex-CEO to prison for 24 years (cnbc.com)
972.
The Katsuification of Britain (vittlesmagazine.com)
973.
Birds aren't real – how to create your own "bird" (lampysecurity.com)
974.
Probability Estimates of a 21st Century AMOC Collapse (arxiv.org)
975.
Launch HN: Bucket Robotics (YC S24) – Defect detection for molded and cast parts
976.
Ditch the sim rig and use your car instead (2019) (outlandnish.com)
977.
Hacker Purity Test (1989) (armory.com)
978.
When Nothing Ever Goes Out of Print: Maintaining Backlist Ebooks (2016) (teresaelsey.medium.com)
979.
Apprentice, Journeyman, and Master: The Medieval Guild (2018) (blog.philosophicalsociety.org)
980.
Leveraging AI for efficient incident response (engineering.fb.com)
981.
The spies in your home: How WiFi companies monitor your private life (proton.me)
982.
PSA: Internet Archive "glitch" deletes years of user data and accounts (blog.gingerbeardman.com)
983.
You can contribute to KDE with non-C++ code (rabbitictranslator.com)
984.
A/B testing mistakes I learned the hard way (newsletter.posthog.com)
985.
Segment Anything Model and Friends (lightly.ai)
986.
Foundation for Human Vision Models (github.com)
987.
GIL Become Optional in Python 3.13 (geekpython.in)
988.
How NASA brought the F-1 “moon rocket” engine back to life (2013) (arstechnica.com)
989.
Cryptographic Right Answers: Post Quantum Edition (latacora.com)
990.
Formal CHERI: design-time proof of full-scale architecture security properties (2022) (lightbluetouchpaper.org)