Front-page articles summarized hourly.
It requests setting a user-agent and respecting the site's robots policy, with references to related documentation and a Phabricator task.
The post presents a profile-based approach to road geometry using only lines and circular arcs. Profiles (cross-sections) define the road; the path is the interpolation of these profiles. Connecting two endpoints with prescribed tangents usually needs more than a single arc. The fix: a two-line fillet construction—extend continuation lines to their intersection and draw a circle tangent to both. If continuation lines don’t intersect, insert an intermediary profile chosen with a cubic Hermite spline, using its midpoint tangent. Edge cases are handled by design constraints; future work covers road intersections and networks. Footnotes discuss derivatives and inflection points.
Amiga Graphics Archive is a site dedicated to graphics made for or with the Commodore Amiga. It curates historic images, magazine art, and work by artists such as Jo-Anne Park, Facet, Island Graphics, and others, with regular updates (through 2026) covering color cycling techniques, scans from CU Amiga, Compute! Amiga Resource, and Amiga Magazin, plus comparisons and game/logo collections. It notes copyright and provides contact. The site is built by LyCheSis using 11ty.
RFC 3986 permits empty path segments; a double slash in an HTTP URL path denotes a zero-length segment and is syntactically meaningful. URL normalization does not include collapsing //, as that would alter the path’s segment sequence and the identifier. HTTP/URI normalization removes dot-segments and, for http(s), can map an empty path to “/” and apply scheme-based rules, but it does not collapse repeated slashes. Therefore, URLs like /furweb.git// and /furweb.git/ are non-equivalent unless the origin defines equivalence; some servers/tools may mishandle this, but it is not standard normalization.
Proposes a binary-level defense: rewrite every syscall instruction in a Linux binary at load time so a process talks only to a tiny, userland “library kernel” that implements about 40 syscalls. All other 410 syscalls are intercepted by a small shim inside a minimal VM. The process runs with 0F 05 replaced by a trap (INT3/NOP); a fast, in-VM dispatcher enforces policy, emulates calls, or backs off to the hypervisor as needed. JIT-generated syscalls are handled via a self-healing LSTAR patch. Result: near-native performance with full argument inspection and control over syscall behavior.
An order is a set with a binary relation obeying laws. Linear orders are total, reflexive, transitive, antisymmetric; with totality they form chains. Dropping totality yields partial orders (posets). Joins (least upper bounds) and meets (greatest lower bounds) generalize max/min; chains are linearly ordered subsets. Hasse diagrams illustrate relations; examples include color-mixing, divisibility, and inclusion of sets. Birkhoff’s representation: distributive lattices ≅ inclusion orders of join-irreducibles. Lattices are posets with joins and meets; bounded lattices have least and greatest elements. Preorders extend orders; preorders are thin categories, linking order theory to category theory via products/coproducts as meets/joins.
IPv6 is seen as more complex not because of its longer addresses, but because adopting a new protocol requires changing implementations, a new version, and interworking with IPv4. The 1990s IETF pursued IPng amid several proposals; the 1994 decision guided by RFCs led to IPv6 to tackle routing scalability and address exhaustion. Coexistence with IPv4—via dual-stack or translation—was recognized as unavoidable. Most deployment challenges come from IPv4/IPv6 coexistence rather than IPv6’s own design. Proposals like "IPv8" would not simplify the transition; bigger addresses were the core justification.
Wax Letter offers bulk mailing of custom wax-sealed letters, handling printing, hand-sealing with your logo, and mailing for you. Features: logo-uploaded seals, scalable bulk processing, and personalized content. Ideal for weddings, corporate direct mail, and holiday cards, from 1 to 10,000+ letters. They provide a Mailing Guide covering USPS considerations and seal durability. Ready-to-start options and a project contact form are available to initiate your wax-sealed mail.
John M. Lindbakk introduces Brunost, a purely Nynorsk, interpreted language implemented in Zig. It enforces Nynorsk for identifiers and ships with a Nynorsk dictionary. The syntax covers immutable variables (fast), mutable ones (endreleg), conditionals (viss / ellers), functions (gjer, gjevTilbake), and loops (forKvart, medan). It uses imports (bruk) and try/catch error handling (prøv / fang). It can run in browsers and Wasm. The post shows examples (Hello world, Fibonacci, FizzBuzz, Conway’s Life) and notes Brunost is a playful, incomplete project with plans for libraries, docs, and tooling.
Interval Calculator is a GitHub project by Victor Poughon implementing interval union arithmetic: calculations over unions of intervals, e.g., [a,b] U [c,d], with the inclusion property guaranteeing the result contains the value from input choices. It supports arithmetic operations (+, -, *, /, exponent) and a union operator U, allowing nested intervals like [0,[0,100]]. Bare numbers are treated as narrow intervals. Full precision mode uses IEEE 754 doubles to bound results and preserve containment; a non-full-precision mode uses degenerate intervals and limits decimals. It provides functions, constants, and preserves disjoint unions; bug reports and future enhancements are noted.
Transcription, Lerner’s hybrid ‘séance,’ blends poetry, fiction and essays to probe fatherhood, aging, and media. An unnamed narrator interviews his 90-year-old mentor, Thomas, in Providence; when the narrator drops his phone, the ensuing interview is largely reconstructed from memory, a process that haunts the book’s second and third sections, which follow Thomas’s son Max and a family grappling with a daughter’s ARFID. Central is how voice, memory and fiction shape reality, with technology and parenting at its core. Written after Lerner’s heart surgery, it marks a tender, self-aware turn beyond The Topeka School.
trust-manager is an Emacs package (MELPA) that enables just‑in‑time trust management to reduce friction in Emacs’s security model, where Emacs 30+ marks files as trusted/untrusted. It prompts on first access per project; decisions persist. It auto-trusts init, early-init, custom files, and load-path. Untrusted Lisp buffers show a red '?' in the mode line, which you can click to trust and restore features. Settings live in trust-manager-trust-alist and can be edited with trust-manager-customize or dedicated commands; it hooks into forgetting projects. Install via MELPA or from Git sources. Author: Eshel Yaron.
Casus Belli Engineering describes how organizations respond to visible failures by scapegoating a foundation component and replacing it with the advocate's preferred worldview. Rooted in Girard's scapegoating theory, the mechanism relies on crisis, rivalry, and collective imitation; insecure leaders craft a narrative that assigns guilt to a proximate foundation and promotes a replacement aligned with their technology or methodology. In software, Agile is a case: Waterfall becomes the scapegoat, agile branding disguises replacement as progress. The piece warns that real causes (testing gaps, error handling) survive, and calls for rigorous root-cause analysis and resisting rhetoric in favor of engineering evidence.
Adam Conover interviews Keza MacDonald about Nintendo's secrecy and enduring success in a chaotic game industry. Drawing on MacDonald's book Super Nintendo: The Game-Changing Company That Unlocked the Power of Play, the episode explores how Nintendo has innovated and surprised players for decades with minimal publicity, avoiding many industry pitfalls that have troubled others.
Google/YouTube is blocking access due to unusual traffic from the user’s network and requires solving a CAPTCHA to continue. The message suggests automated requests may come from malware, a browser plugin, or a script, and that sharing the network with others could trigger the block. The page lists the user’s IP and timestamp for reference.
This guide explains hosting a blog on a subdirectory (example.com/blog) rather than a subdomain (blog.example.com) using Cloudflare Workers. It covers: configuring DNS for the main site and blog, setting the Next.js app’s basePath to /blog and ensuring correct routing for static assets, adding and deploying a Cloudflare Worker that proxies /blog requests to the blog’s subdomain, and wiring Cloudflare Routes so example.com/blog* uses the worker. It also shows how to set noindex for the subdomain and verify that the subdirectory is indexed, noting Cloudflare UI changes.
An enormous ancient-DNA study of 15,836 individuals from western Eurasia shows human evolution accelerated over the last 10,000 years, with 479 gene variants under directional selection after agriculture. The findings, based on consistent frequency shifts across groups, imply rapid biological changes as farming spread and Bronze Age intensification. Immunity genes dominate; several skin-pigmentation variants rose, a multiple-sclerosis risk variant rose then fell, and a HIV-resistance variant increased earlier. Some researchers question the scale or interpretation for complex traits.
An iTerm2 SSH integration bug lets untrusted terminal output impersonate the remote conductor. By placing forged DCS 2000p and OSC 135 messages in a readme.txt, a normal cat readme.txt can trigger iTerm2 to execute the conductor workflow, including getshell and pythonversion, and then run an attacker-controlled payload via a base64-encoded run command. The PoC uses readme.txt plus ace/c+aliFIo; reproduce with genpoc.py. A fix was committed (a9e7459...), not yet in stable releases. Root cause: trust failure in terminal-output–driven conductor negotiation.
Made by Johno Whitaker using FastHTML