~hackernews | Bookmarks (23485)
-
Defense Against AI-Guided Traffic Analysis (Daita)
Even if you have encrypted your traffic with a VPN (or the Tor Network), advanced traffic...
-
Shell sold carbon credits for carbon that was never captured
Shell sold millions of carbon credits for reductions in greenhouse gas emissions that never happened, allowing...
-
Product Roadmap
In the past year, Bluesky has grown from 40K users to 5.6M users. We’ve made it...
-
Rivian wins $827M from Illinois to expand its factory for R2 lineup
Rivian is getting $827 million in incentives from the state of Illinois to support building its...
-
Micro-Dosing Caffeine
Home How I manage my caffeine intake. I was late to the game when it comes...
-
Google is an 'amazing example' of employing people in 'BS jobs'
The idea that Big Tech overhires talent to have them on hand for future projects—and ensure...
-
Caffeine's Double-Edged Sword: Boosting Energy or Risking Health?
Summary: The caffeinated beverage industry continues to thrive, with the coffee sector alone generating significant economic...
-
How to teach writing research papers
This article is about teaching research students how to write research papers. To make it concrete,...
-
Qt and C++ Trivial Relocation (Part 1)
The container classes introduced in Qt 4 (Tulip, for the aficionados) had an interesting optimization: the...
-
Ask HN: Do startups building on OpenAI have a defensible moat?
The technical moat for software companies is the effort to implement the logic; for instance, many...
-
Sound-suppressing silk can create quiet spaces
We are living in a very noisy world. From the hum of traffic outside your window...