AI Summarized Hacker News

Front-page articles summarized hourly.

Largest electric autonomous container ship begins commercial service

China delivered Ning Yuan Dian Kun, the world's largest intelligent container ship powered entirely by electricity, for Ningbo–Jiaxing coastal service. With 740 TEU capacity, it is independently developed by SDARI and features an electric propulsion system by SMERI. The vessel uses 10 power units totaling ~19,600 kWh, enabling zero-emission, low-noise operation and autonomous navigation. Two permanent-magnet motors can cut annual emissions by about 1,462 tons and eliminate SOx, NOx, and particulates. Ningbo Ocean Shipping Co aims to demonstrate a fully electric seagoing model and promote zero-carbon, intelligent coastal shipping.

HN Comments

Show HN: I built a RISC-V emulator that runs DOOM

rvcore is a single-core RV32IM RISC-V emulator designed to run DOOM, with FENCE and EBREAK treated as NOP. Build with CMake and a C++20 compiler; requires SDL3. Build steps: mkdir build; cmake -B build -DCMAKE_BUILD_TYPE=Release; cmake --build . Dependencies: libsdl3-dev. It integrates with doomgeneric; clone doomgeneric and use a riscv64-unknown-elf-gcc toolchain or riscv64-gnu-toolchain, then build doomgeneric and make. Milestones include running flat binaries (assembly/C), ELF binaries with one PT_LOAD, newlib stubs, booting DOOM, and making DOOM playable; M-extension to be added.

HN Comments

Cordouan Lighthouse

Requests to set a user-agent and respect the robot policy; see https://w.wiki/4wJS and https://phabricator.wikimedia.org/T400119.

HN Comments

Metal Gear Solid 2's Source Code Has Been Leaked on 4Chan

Metal Gear Solid 2's 2011 HD remaster code for the Vita and Xbox 360 ports has leaked online, reportedly including uncompressed assets and up to 30 GB of unused material, though some reports say it contains only the code without assets. The leak, linked to Armature and traced to 4chan, could aid preservation and modding, even as fans still rely on Master Collection Volume 1. Details remain uncertain as of May 1, 2026.

HN Comments

What Chromium versions are major browsers are on?

Chromium Drift explains how far behind major Chromium-based browsers can be. When a browser ships an older Chromium version, users are exposed to known, patched security vulnerabilities whose fixes are public in Chromium’s source but not yet shipped. Attackers may exploit these flaws, so the article advises users to check their browser’s Chromium version.

HN Comments

A Desktop Made for One

Geir Isene chronicles building a personal desktop where almost every program is self-made. He runs two layers: CHasm (assembly) handling windowing, shell, and terminal; Fe₂O₃ (Rust on crust) handling text editing and file management via scribe and related tools. After 25 years, he replaced Vim with scribe, a writer-oriented editor tailored to his workflow. The piece argues that, with Rust, CC, and TUI docs, it’s feasible to BYOS—create a desktop that fits one person, weekend-by-weekend.

HN Comments

I Built SpecDD Because AI Kept Forgetting What We Were Building

SpecDD is a framework for local, structured specifications that live beside code to provide exact context for AI agents. The author argues AI won’t replace developers; context, not bigger prompts, is the bottleneck. SpecDD specs act as contracts (Must, Must not, Owns, Depends on, Forbids, Done when) and use Given/When/Then to spell out behavior, enabling reliable automation and cross-team understanding. AI can draft specs, but humans must review to avoid wrong implementations. The approach yields documentation, a project-wide contract, and onboarding material; it’s experimental now, with future tooling and model-internalization anticipated. Available at specdd.ai and GitHub under Apache 2.0.

HN Comments

Uncle Bob: It's Over

Your request is blocked by a network policy. To regain access, log in or create an account; if using a script, sign in with developer credentials. Ensure your User-Agent is non-empty and descriptive; revert any alternate User-Agent to default if blocked. Review Reddit's Terms of Service. If you think the block is in error or want easier data access, file a support ticket and include your Reddit account and the code 019deec9-aedb-77f6-ba15-df412b324f53.

HN Comments

For thirty years I programmed with Phish on, every day

Meiklejohn recounts three decades coding to Phish, a ritual that fused music and work into one flow state—long jams, complex distributed systems, and production software that lived and breathed at the desk. Since January 2026, his work with multi-agent systems has become segmented and rate-limited—queues, context switches, and rapid responses—so the music no longer touches the day. He still attends Phish shows and keeps listening daily, but the flow state he cherished is gone. How can flow be rekindled in an increasingly agentic, interrupt-driven world?

HN Comments

Coffee doesn't just wake you up–a biological pathway illuminates health effects

Texas A&M researchers report that compounds in brewed coffee, especially polyphenols like caffeic acid, bind and activate the NR4A1 receptor, a protein linked to aging, stress response, inflammation, metabolism, and tissue repair. This activation reduces cellular damage and slows cancer cell growth in lab models; removing NR4A1 eliminates these effects. Caffeine is not the main driver; both regular and decaf coffee may confer similar benefits. The work is mechanistic and part of broader pathways, with efforts to develop synthetic NR4A1-targeting therapies.

HN Comments

Business Owners Are Worst Clients

An analysis by a digital marketing agency owner of inbox and email history since 2010 finds that when the purchaser and primary contact are business owners, they are most likely to become the worst clients. The author notes a recurring pattern: tantrums, threats of legal action, or escalations tend to come from other business owners, despite substantial goodwill and free work offered. The takeaway: be kind to fellow business owners.

HN Comments

I rebuilt my blog's cache. Bots are the audience now

Thirty years of HTTP caching were opaque until AI tools clarified it. The author used Claude/ChatGPT to decode headers, edge vs browser caching, and craft a coherent strategy for a Ghost blog on Cloudflare. Now AI crawlers and retrieval systems are the primary readers, so caching is infrastructure for machine readership, not just human speed. The result: globally consistent edge caching, readable rules, and a traffic dashboard (Workers, Cache Rules, D1) showing humans, AI crawlers, SEO crawlers. Bots as readers, not threats, reshape what to optimize.

HN Comments

Porsche will contest Laguna Seca in historic colors of the Apple Computer livery

Porsche will race Laguna Seca in a historic Apple Computer-inspired livery based on the 1980 Porsche 935 K3 to mark Porsche Motorsport's 75th anniversary and Apple's 50th. The two factory Porsche 963s from Porsche Penske Motorsport (No. 6 Estre/Vanthoor; No. 7 Andlauer/Nasr) will compete in GTP alongside JDC-Miller MotorSports' No.5 963. In GTD Pro AO Racing runs the 911 GT3 R “Rexy” with a “Sketchy” livery, and Wright Motorsports fields a 911 GT3 R in GTD. The two-hour-and-40-minute race is on May 3.

HN Comments

Security Through Obscurity Is Not Bad

Mo Beigi contends that security through obscurity (STO) can be a useful extra layer, while relying on obscurity alone is dangerous (per Kerckhoffs's principle). Obscurity slows attackers and raises costs, as shown by examples like WordPress table prefixes, CS:GO's debug symbols, and pervasive code obfuscation in malware. Major techs (Google reCAPTCHA, Netflix, Riot Vanguard) also use obfuscation to protect logic. AI can eventually break obscurity but remains costly and slow. Conclusion: ONLY obscurity is bad; obscurity as an addition is good.

HN Comments

What Is Z-Angle Memory and Why Is Intel Developing It?

Cloudflare blocks access to hpcwire.com with an Attention Required page. The block was triggered by a security rule (suspicious input or data). To resolve, email the site owner, describe what you were doing, and include the Cloudflare Ray ID (9f6079f65c0df0af) and your IP address.

HN Comments

Automating Hermitage to see how transactions differ in MySQL and MariaDB

An exploration of how MySQL and MariaDB handle transaction isolation, focusing on dirty reads/writes. Using a new tool, Monastery, the article automates cross-database tests of isolation levels (Read Uncommitted, Read Committed, Repeatable Read, Serializable) via a shoes-table experiment where two concurrent transactions update left and right shoes. Depending on isolation level, reads may see inconsistent results. The goal is to quantify practical differences in transactional behavior between the two databases.

HN Comments

Mercedes-Benz commits to bringing back physical buttons

Mercedes-Benz will reintroduce physical buttons for key controls in future models after customer feedback showed touch-sensitive systems were a mistake. The brand will keep large screens but add hard keys for functions users want direct access to. The next GLC and C-Class will use the MB.EA platform and a near-wide MBUX Hyperscreen, with physical buttons ahead of the wireless chargers and on the steering wheel, plus a customizable wallpaper on the screen. This contrasts with rivals trimming displays rather than restoring hardware controls.

HN Comments

Haskell: Debugging

An overview of debugging in Haskell, describing how to obtain and use stack traces, tracing, and interactive debugging. It covers enabling runtime stack traces in GHC (-prof, +RTS -xc) and, since GHC 7.8, programmatic dumping via errorWithStackTrace. It shows tracing with Debug.Trace.trace (and Hugs.Observe, Hood, and GHood for enhanced observability), plus remote and safe-library approaches for safer failures. It surveys offline analysis tools like Haskell Tracer HAT and Hoed, and dynamic breakpoints in GHCi. It also explains source-located errors with Loch, locating failures in library code, and tips for parse errors (-ferror-spans) and infinite loops (-fbreak-on-error, :trace, :history).

HN Comments

Breaking Up with WordPress After Two Decades

Moving from SiteGround to Bluehost revealed that cheap hosting brings operational friction, and Bluehost’s uptime wasn’t consistently reliable. More importantly, WordPress no longer served the author’s archive-driven workflow: it’s good for publishing but poor at inspecting, reorganizing, and linking decades of writing. He built Yapress—a markdown-first, static-like publishing system (with WordPress import, taxonomies, series, content validation) stored as files, searchable locally, and extensible via plugins. He sacrifices comments for ownership and simplicity, and chose Next.js for deployment, aided by AI tooling.

HN Comments

Utah to hold websites liable for users who mask their location with VPNs

Utah becomes the first U.S. state to hold websites legally responsible for users who mask their location with VPNs, with Senate Bill 73 taking effect May 6. It defines a user as being in Utah if physically present, regardless of VPN/proxy use, and bars sites from giving instructions to bypass age verifications. Enforcement hinges on detecting VPNs, which is unreliable since VPNs rotate addresses and many methods fail. Critics warn it could chill privacy, hamper journalists and dissidents, and push broader global verification; UK and France are considering similar moves.

HN Comments

Made by Johno Whitaker using FastHTML