2018
view article2017
view article2016
view article2013
view article2009
view article2008
view article2008
view article2007
view article2004
view article2000
view article1997
view article1996
view article1996
view article1993
view article1989
view article1981
view article1980
view article1975
view article1975
view article1974
view article1973
view article1969
view article1968
view article1961
view article1956
view article1955
view article1948
view article1948
view article1946
view article1942
view article1936
view article1933
view article1922
view article1920
view article1895
view article1888
view article1885
view article1865
view article1860
view article1721
view article1559
view articleJSON Canvas SpecVersion 1.0 — 2024-03-11Top levelThe top level of JSON Canvas contains two arrays: nodes (optional, array of nodes) edges (optional, array ...
Qwen Chat offers comprehensive functionality spanning chatbot, image and video understanding, image generation, document processing, web search integration, tool utilization, and artifacts.
Tailscale now has a full windowed UI. Before that, our app had to tell you it was hidden by The Notch.
Cursor 3 is a unified workspace for building software with agents.
A tool that connects everyday work into one space. It gives you and your teams AI tools—search, writing, note-taking—inside an all-in-one, flexible workspace.
On their voyages to the moon, NASA’s astronauts are finally getting some creature comforts of terrestrial toilets—such as having a door and being able to pee and poop simultaneously
Microsoft is running one of the largest corporate espionage operations in modern history. Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm. The user is never asked. Never told. LinkedIn’s privacy policy does not mention it. Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.,Microsoft is running one of the largest corporate espionage operations in modern h
Plus: A launcher for recompilations and a new PS1 fan translation.
Inside the complacency and decisions that eroded trust in Azure—from a former Azure Core engineer.
Good Magazines from the 1970s and 1980s.
OpenAI acquires TBPN to accelerate global conversations around AI and support independent media, expanding dialogue with builders, businesses, and the broader tech community.
Post Mortem: axios npm supply chain compromise Date: March 31, 2026 Author: Jason Saayman Status: Remediation in progress On March 31, 2026, two malicious versions of axios (1.14.1 and 0.30.4) were published to the npm registry through m...
George Goble Obituary George Harry Goble, affectionately known as "GHG," of West Lafayette, Indiana, passed away peacefully on March 18, 2026, at Majestic Care of Lafayette. He was 73 years old. Born,George Goble Obituary George Harry Goble, affectionately known as "GHG," of West Lafayette, Indiana, passed away peacefully on March 18, 2026, at Majestic Care of Lafayette. He was 73 years old. Born
Gemma 4 is a family of open models, purpose-built for advanced reasoning and agentic workflows.
c89cc.sh - standalone C89/ELF64 compiler in pure portable shell - c89cc.sh