Latest entries

  1. Eight years of wanting, three months of building with AI

    Eight years of wanting, three months of building with AI Lalit Maganti provides one of my favorite pieces of long-form writing on agentic engineering I've seen in ages. They spent eight years thinking about and then three months building syntaqlite, which they describe as "high-fidelity devtools that…

    Simon WillisonPublished

  2. Quoting Chengpeng Mou

    From anonymized U.S. ChatGPT data, we are seeing: ~2M weekly messages on health insurance ~600K weekly messages [classified as healthcare] from people living in “hospital deserts” (30 min drive to nearest hospital) 7 out of 10 msgs happen outside clinic hours — Chengpeng Mou, Head of Business Finance…

    Simon WillisonPublished

  3. Syntaqlite Playground

    Tool: Syntaqlite Playground Lalit Maganti's syntaqlite is currently being discussed on Hacker News thanks to Eight years of wanting, three months of building with AI, a deep dive into how it was built. This inspired me to revisit a research project I ran when Lalit first released it a couple of weeks…

    Simon WillisonPublished

  4. Remakes And Remasters Of Old DOS Games: A Small 2026 Update

    It’s been two years since the Remakes And Remasters Of Old DOS Games article. Nostalgia still sells handsomely thus our favourite remaster studios (hello Night Dive) are cranking out hit after hit. It’s time for a small 2026 update. I’ve also updated the original article just in case you might find your…

    Wouter GroeneveldPublished

  5. CBP facility codes sure seem to have leaked via online flashcards

    Quizlet flashcards seem to include sensitive information about gate security at CBP locations.

    Ars TechnicaPublished

  6. scan-for-secrets 0.2

    Release: scan-for-secrets 0.2 CLI tool now streams results as they are found rather than waiting until the end, which is better for large directories. -d/--directory option can now be used multiple times to scan multiple directories. New -f/--file option for specifying one or more individual files to…

    Simon WillisonPublished

  7. scan-for-secrets 0.1.1

    Release: scan-for-secrets 0.1.1 Added documentation of the escaping schemes that are also scanned. Removed unnecessary repr escaping scheme, which was already covered by json.

    Simon WillisonPublished

  8. scan-for-secrets 0.1

    Release: scan-for-secrets 0.1 I like publishing transcripts of local Claude Code sessions using my claude-code-transcripts tool but I'm often paranoid that one of my API keys or similar secrets might inadvertently be revealed in the detailed log files. I built this new Python scanning tool to help reassure…

    Simon WillisonPublished

  9. research-llm-apis 2026-04-04

    Release: research-llm-apis 2026-04-04 I'm working on a major change to my LLM Python library and CLI tool. LLM provides an abstraction layer over hundreds of different LLMs from dozens of different vendors thanks to its plugin system, and some of those vendors have grown new features over the past year…

    Simon WillisonPublished

  10. Artemis II is going so well that we're left to talk about frozen urine

    "I think the fixation on the toilet is kind of human nature."

    Ars TechnicaPublished

  11. Tech companies are trying to neuter Colorado’s landmark right-to-repair law

    A state bill is a glimpse of how corporations are limiting people's ability to make their own fixes and upgrades.

    Ars TechnicaPublished

  12. Quoting Kyle Daigle

    [GitHub] platform activity is surging. There were 1 billion commits in 2025. Now, it's 275 million per week, on pace for 14 billion this year if growth remains linear (spoiler: it won't.) GitHub Actions has grown from 500M minutes/week in 2023 to 1B minutes/week in 2025, and now 2.1B minutes so far this…

    Simon WillisonPublished

  13. Emacs live stream with Sacha Chua on 2026-04-16 17:30 Europe/Athens

    I will do a live together with Sacha Chua where we will do some programming on Emacs.

    Protesilaos StavrouPublished

  14. Vulnerability Research Is Cooked

    Vulnerability Research Is Cooked Thomas Ptacek's take on the sudden and enormous impact the latest frontier models are having on the field of vulnerability research. Within the next few months, coding agents will drastically alter both the practice and the economics of exploit development. Frontier model…

    Simon WillisonPublished

  15. The cognitive impact of coding agents

    A fun thing about recording a podcast with a professional like Lenny Rachitsky is that his team know how to slice the resulting video up into TikTok-sized short form vertical videos. Here's one he shared on Twitter today which ended up attracting over 1.1m views! That was 48 seconds. Our full conversation…

    Simon WillisonPublished

  16. Trump proposes steep cut to NASA budget as astronauts head for the Moon

    Congress will likely reject the White House's NASA cuts, just as it did last year.

    Ars TechnicaPublished

  17. Ice Age dice show early Native Americans may have understood probability

    Ice Age hunter-gatherer "were intentionally relying on random outcomes in repeatable, rule-based ways."

    Ars TechnicaPublished

  18. As Artemis II zooms to the Moon, everything seems to be going swimmingly

    The cabin was colder on Thursday, but the crew has been able to adjust the temperature.

    Ars TechnicaPublished

  19. Quoting Willy Tarreau

    On the kernel security list we've seen a huge bump of reports. We were between 2 and 3 per week maybe two years ago, then reached probably 10 a week over the last year with the only difference being only AI slop, and now since the beginning of the year we're around 5-10 per day depending on the days…

    Simon WillisonPublished

  20. Quoting Daniel Stenberg

    The challenge with AI in open source security has transitioned from an AI slop tsunami into more of a ... plain security report tsunami. Less slop but lots of reports. Many of them really good. I'm spending hours per day on this now. It's intense. — Daniel Stenberg, lead developer of cURL Tags: daniel…

    Simon WillisonPublished

  21. Quoting Greg Kroah-Hartman

    Months ago, we were getting what we called 'AI slop,' AI-generated security reports that were obviously wrong or low quality. It was kind of funny. It didn't really worry us. Something happened a month ago, and the world switched. Now we have real reports. All open source projects have real reports that…

    Simon WillisonPublished

  22. Elon Musk insists banks working on SpaceX IPO must buy Grok subscriptions

    Some banks "agreed to spend tens of millions on the chatbot," NYT reports.

    Ars TechnicaPublished

  23. "Cognitive surrender" leads AI users to abandon logical thinking, research finds

    Experiments show large majorities uncritically accepting "faulty" AI answers.

    Ars TechnicaPublished

  24. Trump ignores biggest reasons his AI data center buildout is failing

    Nearly 50% of data center projects delayed as China holds key to power infrastructure.

    Ars TechnicaPublished

  25. OpenClaw gives users yet another reason to be freaked out about security

    The viral AI agentic tool let attackers silently gain admin unauthenticated access.

    Ars TechnicaPublished

  26. Netflix must refund customers for years of price hikes, Italian court rules

    Consumer group says it will sue if Netflix doesn't reduce current prices.

    Ars TechnicaPublished

  27. Can JavaScript Escape a CSP Meta Tag Inside an Iframe?

    Research: Can JavaScript Escape a CSP Meta Tag Inside an Iframe? In trying to build my own version of Claude Artifacts I got curious about options for applying CSP headers to content in sandboxed iframes without using a separate domain to host the files. Turns out you can inject tags at the top of the…

    Simon WillisonPublished

  28. EV adoption in America: Who's winning, who's losing?

    Some OEMs saw double-digit growth in Q1, others saw double-digit declines.

    Ars TechnicaPublished

  29. The Axios supply chain attack used individually targeted social engineering

    The Axios team have published a full postmortem on the supply chain attack which resulted in a malware dependency going out in a release the other day, and it involved a sophisticated social engineering campaign targeting one of their maintainers directly. Here's Jason Saayman'a description of how that…

    Simon WillisonPublished

  30. OpenAI takes on another "side quest," buys tech-focused talk show TBPN

    OpenAI says program will remain in Los Angeles and will be editorially independent.

    Ars TechnicaPublished

  31. Four astronauts are now inexorably bound for the Moon

    “I don’t think we could be more pleased."

    Ars TechnicaPublished

  32. Emacs: new sequence scheme for the ‘denote-sequence’ package

    Information about a new feature that I just added to the 'denote-sequence' package.

    Protesilaos StavrouPublished

  33. The Web Is An Antitrust Wedge

    TL;DR: Armed with new powers to rein in the worst excesses of mobile's duopolists, antitrust bodies around the world are struggling to find their footing, and an incurious tech press is letting it pass with nary a nod. Browsers are app stores, but that perspective is almost entirely absent from the antitrust…

    Alex RussellPublished

  34. Perplexity's "Incognito Mode" is a "sham," lawsuit says

    Google, Meta, and Perplexity accused of sharing millions of chats to increase ad revenue.

    Ars TechnicaPublished

  35. Highlights from my conversation about agentic engineering on Lenny's Podcast

    I was a guest on Lenny Rachitsky's podcast, in a new episode titled An AI state of the union: We've passed the inflection point, dark factories are coming, and automation timelines. It's available on YouTube, Spotify, and Apple Podcasts. Here are my highlights from our conversation, with relevant links…

    Simon WillisonPublished

  36. SpaceX tries to convince FCC that Amazon put satellites into wrong altitude

    Amazon denies violation, says SpaceX caused conflict by lowering Starlink satellites.

    Ars TechnicaPublished

  37. Google Vids gets AI upgrade with Veo and Lyria models, directable AI avatars

    Google Vids brings together Google's most capable AI creation tools.

    Ars TechnicaPublished

  38. Male octopuses guided through mating by female hormones

    A receptor that's used to find prey is also activated by progesterone.

    Ars TechnicaPublished

  39. The Blandness of Systematic Rules vs. The Delight of Localized Sensitivity

    Marcin Wichary brings attention to this lovely dialog in ClarisWorks from 1997: He quips: this breaks the rule of button copy being fully comprehensible without having to read the surrounding strings first, perhaps most well-known as the “avoid «click here»” rule. Never Register/​Register Later/​Register…

    Jim NielsenPublished

  40. Gemma 4: Byte for byte, the most capable open models

    Gemma 4: Byte for byte, the most capable open models Four new vision-capable Apache 2.0 licensed reasoning LLMs from Google DeepMind, sized at 2B, 4B, 31B, plus a 26B-A4B Mixture-of-Experts. Google emphasize "unprecedented level of intelligence-per-parameter", providing yet more evidence that creating…

    Simon WillisonPublished

  41. llm-gemini 0.30

    Release: llm-gemini 0.30 New models gemini-3.1-flash-lite-preview, gemma-4-26b-a4b-it and gemma-4-31b-it. See my notes on Gemma 4. Tags: gemini, llm, gemma

    Simon WillisonPublished

  42. New fossil deposits show complex animal groups predating the Cambrian

    Collection of fossils includes Ediacaran, Cambrian species, suggesting a transition.

    Ars TechnicaPublished

  43. New Rowhammer attacks give complete control of machines running Nvidia GPUs

    GDDRHammer, GeForge and GPUBreach hammer GPU memory in ways that hijack the CPU.

    Ars TechnicaPublished

  44. Bringing in the experts; Having our Passkeys implementation Security Tested

    We recently announced support for Passkeys on your Report URI account, and everyone should go and enable Passkeys for the amazing security benefits they offer. As a new implementation of an authentication technology, we wanted to be sure that everything was as secure as it should be for our customer…

    Scott HelmePublished

  45. March 2026 sponsors-only newsletter

    I just sent the March edition of my sponsors-only monthly newsletter. If you are a sponsor (or if you start a sponsorship now) you can access it here. In this month's newsletter: More agentic engineering patterns Streaming experts with MoE models on a Mac Model releases in March Vibe porting Supply chain…

    Simon WillisonPublished

  46. Prot Asks: Hjalmar about Emacs for music, the joy of art, and Internet sociability

    In this 2-hour video I talk with Hjalmar about using Emacs to write music, the joy of artistic expression, and sociability in the Internet era.

    Protesilaos StavrouPublished

  47. Learning from the land

    An entry from my journal where I comment on how I learn by observing the phenomena around me.

    Protesilaos StavrouPublished

  48. datasette-llm 0.1a6

    Release: datasette-llm 0.1a6 The same model ID no longer needs to be repeated in both the default model and allowed models lists - setting it as a default model automatically adds it to the allowed models list. #6 Improved documentation for Python API usage. Tags: llm, datasette

    Simon WillisonPublished

  49. datasette-enrichments-llm 0.2a1

    Release: datasette-enrichments-llm 0.2a1 The actor who triggers an enrichment is now passed to the llm.mode(... actor=actor) method. #3 Tags: enrichments, llm, datasette

    Simon WillisonPublished

  50. Favourites of March 2026

    Our daughter turned three. We’re beyond exhausted but a ripgrep search in this repository yields five more instances of the word exhausted in combination of parenting so I’ll shut up. I guess we also celebrate that after three years of pure chaos, we’re… still alive? Previous month: February 2026. Games…

    Wouter GroeneveldPublished

  51. Apple at 50: my top five Apple moments

    The whole world is on the streets, delirious with joy, as today one of the world’s largest companies turns 50 years old. The web is full of reminiscences about Apple products and Saint Steve, such as Apple at 50: My 10 most memorable moments. I haven’t been an Apple user for as long as many […]

    Bruce LawsonPublished

  52. datasette-extract 0.3a0

    Release: datasette-extract 0.3a0 Now uses datasette-llm to manage model configuration, which means you can control which models are available for extraction tasks using the extract purpose and LLM model configuration. #38 Tags: llm, datasette

    Simon WillisonPublished

  53. datasette-enrichments-llm 0.2a0

    Release: datasette-enrichments-llm 0.2a0 This plugin now uses datasette-llm to configure and manage models. This means it's possible to specify which models should be made available for enrichments, using the new enrichments purpose. Tags: llm, datasette

    Simon WillisonPublished

  54. datasette-llm-usage 0.2a0

    Release: datasette-llm-usage 0.2a0 Removed features relating to allowances and estimated pricing. These are now the domain of datasette-llm-accountant. Now depends on datasette-llm for model configuration. #3 Full prompts and responses and tool calls can now be logged to the llm_usage_prompt_log table…

    Simon WillisonPublished

  55. datasette-llm 0.1a5

    Release: datasette-llm 0.1a5 The llm_prompt_context() plugin hook wrapper mechanism now tracks prompts executed within a chain as well as one-off prompts, which means it can be used to track tool call loops. #5 Tags: llm, datasette

    Simon WillisonPublished

  56. Quoting Soohoon Choi

    I want to argue that AI models will write good code because of economic incentives. Good code is cheaper to generate and maintain. Competition is high between the AI models right now, and the ones that win will help developers ship reliable features fastest, which requires simple, maintainable code.…

    Simon WillisonPublished

  57. Chicago vs New York Pizza is the Wrong Argument

    It’s April Cools! It’s like April Fools, except instead of cringe comedy you make genuine content that’s different from what you usually do. For example, last year I talked about The best introductory video games for non-gamers. This year I’m picking a fight. This is “New York” Pizza (NYP): (source)…

    Hillel WaynePublished

  58. When knowing it all does not matter

    An essay from my journal in which I express the connection with my surroundings and how I do not need all the answers.

    Protesilaos StavrouPublished

  59. Supply Chain Attack on Axios Pulls Malicious Dependency from npm

    Supply Chain Attack on Axios Pulls Malicious Dependency from npm Useful writeup of today's supply chain attack against Axios, the HTTP client NPM package with 101 million weekly downloads. Versions 1.14.1 and 0.30.4 both included a new dependency called plain-crypto-js which was freshly published malware…

    Simon WillisonPublished

  60. datasette-llm 0.1a4

    Release: datasette-llm 0.1a4 Ability to configure different API keys for models based on their purpose - for example, set it up so enrichments always use gpt-5.4-mini with an API key dedicated to that purpose. #4 I released llm-echo 0.3 to provide an API key testing utility I needed for the tests for…

    Simon WillisonPublished

  61. llm-all-models-async 0.1

    Release: llm-all-models-async 0.1 LLM plugins can define new models in both sync and async varieties. The async variants are most common for API-backed models - sync variants tend to be things that run the model directly within the plugin. My llm-mrchatterbox plugin is sync only. I wanted to try it out…

    Simon WillisonPublished

  62. llm 0.30

    Release: llm 0.30 The register_models() plugin hook now takes an optional model_aliases parameter listing all of the models, async models and aliases that have been registered so far by other plugins. A plugin with @hookimpl(trylast=True) can use this to take previously registered models into account…

    Simon WillisonPublished

  63. Weekly Update 497

    Day by day, I find we're eeking more goodness out of OpenClaw and finding the sweet spot between what the humans do well and the agent can run off and do on its own. Significantly, we're shifting more and more of the workload to the latter

    Troy HuntPublished

  64. Emacs coaching with Sacha Chua

    I will do a coaching session with Sacha Chua. She wrote a blog post about it and I am making comments on it.

    Protesilaos StavrouPublished

  65. Continuous, Continuous, Continuous

    Jason Gorman writes about the word “continuous” and its place in making software. We think of making software in stages (and we often assign roles to ourselves and other people based on these stages): the design phase, the coding phase, the testing phase, the integration phase, the release phase, and…

    Jim NielsenPublished

  66. HIBP Mega Update: Passkeys, k-Anonymity Searches, Massive Speed Enhancements and a Bulk Domain Verification API

    For a hobby project built in my spare time to provide a simple community service, Have I Been Pwned sure has, well, "escalated". Today, we support hundreds of thousands of website visitors each day, tens of millions of API queries, and hundreds of millions of password searches. We&

    Troy HuntPublished

  67. Launching Passkeys support on Report URI! 🗝️

    As we're always wanting to keep ahead in the security game, I'm happy to announce that we now support Passkeys on Report URI! Let's take a quick look at what Passkeys are, why you should use them, and how we've implemented them.

    Scott HelmePublished

  68. Sacrifice in the era of the adultchild

    An essay from my journal in which I comment on the prevailing norms in my culture and, probably, that of other cultures around the world

    Protesilaos StavrouPublished

  69. 2026 has been the most pivotal year in my career… and it's only March

    In February I left my employer after nearly two decades of service. In the moment I was optimistic, yet unsure I made the right choice. Dust settled, I’m now absolutely sure I chose correctly. I’m happier and better for it. There were multiple factors, but it’s not mere chance it coincides with these…

    Chris WellonsPublished

  70. App Defaults In March 2026

    It’s been almost three years since sharing my toolkit defaults (2023). High time to report an update. There’s a second reason to post this now: I’ve been trying to get back into the Linux groove (more on that later), so I’m hoping to either change the defaults below in the near future or streamline them…

    Wouter GroeneveldPublished

  71. Untitled

    Attempted to give blood for the first time today but failed the vein assessment. Gutted. Signing up was easy, and the team at the new donation centre in Brighton are really friendly, so go and give blood.

    Paul Robert LloydPublished

  72. Philosophy: about the God of war, anger, and nuance

    In this video I expound on the Greek notion of 'god of war' and how we can generally think in nuanced terms.

    Protesilaos StavrouPublished

  73. tar: a slop-free alternative to rsync

    So apparently rsync is slop now. When I heard, I wanted to drop a quick note on my blog to give an alternative: tar. It doesn’t do everything that rsync does, in particular identifying and skipping up-to-date files, but tar + ssh can definitely accomodate the use case of “transmit all of these files…

    Drew DeVaultPublished

  74. Reading List 356

    This reading list is courtesy of Vivaldi browser, who pay me decent money to fight for a better web and don’t moan at me for reading all this stuff. We’ve just released Vivaldi 7.9, adding UI Auto-hide and Follower Tab on Desktop, and on Mobile we released two levels of tabs, beautiful images, Safari…

    Bruce LawsonPublished

  75. New to the web platform in March

    Discover some of the interesting features that have landed in stable and beta web browsers during March 2026.

    web.devPublished

  76. Code generation that just works

    About nine months ago, my son said he wanted to make a video game. He said it was called Exploding Kitties. We made it together on my computer. He described the gameplay and drew the graphics. I vibed the code. The game basically worked. But we had to build it in small pieces. And, periodically, I had…

    Mary Rose CookPublished

  77. My 8-year-old vibe-coded a video game about playing music with Michael McDonald

    My 8-year-old vibe-coded a video game called “Play With Michael McDonald”, and she wanted to present it. So here’s Ella! The origin story After playing some Mario Party minigames the other evening, my 8-year-old daughter said, I wanna make a […]

    Brad FrostPublished

  78. Accessibility Law of Headlines

    Betteridge’s law of headlines states that any headline that ends in a question mark can be answered by the word no. For at least the digital accessibility landscape, I would like to amend it, fork it, whatever it: Any headline that asserts a thing is accessible is wrong. Yes, that…

    Adrian RoselliPublished

  79. Fixing my slow Mac network speeds [blog]

    For a while now both my desktop Mac (running Sonoma) and my laptop (running Tahoe - do not recommend) have had sub-optimal network speeds. My Android phone, on our network, on the same SSID, speed tests at 1.1Gbps. My laptop gets around 160Mbps and my desktop pulls in around 80Mbps. That's quite a difference…

    Remy SharpPublished

  80. Coding Club

    Today I trekked to my daughter’s school (a long walk across the street!) to speak at her after-school coding club that’s been meeting weekly over the last month. It was really fun to see how they were learning to code. […]

    Brad FrostPublished

  81. Building a Runtime with QuickJS

    Building a tiny JavaScript runtime on top of QuickJS with timers, file I/O, and an event loop.

    Andrew HealeyPublished

  82. Maintaining projects long-term

    An entry from my journal where I explain how long-term projects help me stay focused and not get disheartened.

    Protesilaos StavrouPublished

  83. Prot Asks: Arkadiusz about blindness, Emacspeak, Hyperbole, Chinese and Slavic culture

    In this 2-hour video I talk with Arkadiusz about how he uses the computer as a blind person and several other topics.

    Protesilaos StavrouPublished

  84. A eulogy for Vim

    Vim is important to me. I’m using it to write the words you’re reading right now. In fact, almost every word I have ever committed to posterity, through this blog, in my code, all of the docs I’ve written, emails I’ve sent, and more, almost all of it has passed through Vim. My relationship with the software…

    Drew DeVaultPublished

  85. Code as a Tool of Process

    Steve Krouse wrote a piece that has me nodding along: Programming, like writing, is an activity, where one iteratively sharpens what they're doing as they do it. (You wouldn't believe how many drafts I've written of this essay.) There’s an incredible amount of learning and improvement, i.e. sharpening…

    Jim NielsenPublished

  86. Resurrecting a £50 computer with Vivaldi and ChromeOS Flex

    The other day, I was pruning my inbox when I noticed an email from a company that I occasionally buy print cartridges from, IJT Direct, offering a reconditioned PC, with a new USB keyboard, mouse, wifi dongle, all for £50–including tax and delivery. Last year I upcycled an eBay Windows machine for my…

    Bruce LawsonPublished

  87. When “One in a Billion” Happens Every Day: Scaling Redis at Report URI

    Something that I've come to learn as we continue to grow Report URI is that everything is easy until scale makes it hard. We're now processing so much telemetry that a "one in a billion" problem can happen every, single, day, and we'

    Scott HelmePublished

  88. Dine ’n em-dash

    The best defense is to write humanly. The post Dine ’n em-dash appeared first on Jeffrey Zeldman Presents.

    Jeffrey ZeldmanPublished

  89. Please Compensate The Work You Appreciate

    The other day, I had a casual conversation with colleagues about buying music. Nobody gave a rat’s ass; they all just either downloaded the .mp3 files or used Spotify. Most conversations on this topic end like this so I expected the response from more than a few individuals, but not from everyone. I…

    Wouter GroeneveldPublished

  90. Restoring a 2018 iPad Pro

    This was surprisingly hard to find—hat tip to Reddit’s Nakkokaro and xBl4ck. Apple’s instructions for restoring an iPad Pro (3rd generation, 2018) seem to be wrong; both me and an Apple Store technician found that the Finder, at least in Tahoe, won’t show the iPad once it reboots in recovery mode. The…

    Kyle KingsburyPublished

  91. Talking Death of a Software Craftsman on the Dead Code Podcast

    I joined Jared again on the Dead Code Podcast to go a bit deeper on my post, The Death of a Software Craftsman. The outlook is kinda bleak, but plenty of digs at agile software practices :)

    David Bryant CopelandPublished

  92. Do you need AI for that?

    My social feed has divided mostly into two camps—those who can now only talk about how excited they are about AI, and those who are refusing to use it at all. I’m somewhat bemused by both of these positions, I see LLMs as a useful tool, in the way that I see spreadsheets as a […]

    Rachel AndrewPublished

  93. The Creative Infinite

    I found myself using the phrase “the Creative Infinite” when I’m talking about AI as a design material. I keep coming back to it because I don’t think we’ve fully grasped what this technology actually is, what it can do, […]

    Brad FrostPublished

  94. Weekly Update 496

    Watching OpenClaw do its thing must be like watching the first plane take flight. It's a bit rickety and stuck together with a lot of sticky tape, but squint and you can see the potential for agentic AI to change the world as we know it. And I

    Troy HuntPublished

  95. Poem: Of carmine clouds

    Just read the poem. No further comment.

    Protesilaos StavrouPublished

  96. Emacs: spontaneous live stream Tuesday 24 March @ 21:30 Europe/Athens

    I am doing a live stream related to Emacs, where I will continue working on my denote-sequence package.

    Protesilaos StavrouPublished

  97. ‘CanisterWorm’ Springs Wiper Attack Targeting Iran

    A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or have Farsi set as the default language.

    Brian KrebsPublished

  98. Sneaky Header Blocker Trick

    There is a lil’ UI detail on this blog. Most people don’t even notice it, but the ones who do often reach out, asking how on earth it works. It feels like it defies the rules of CSS! In this blog post, I’ll break down the surprisingly-straightforward implementation so you can start using this trick yourself…

    Josh W. ComeauPublished

  99. Emacs: spontaneous live stream Monday 23 March @ 17:00 Europe/Athens

    I am doing a live stream related to Emacs, where I will try to implement a new feature for the denote-sequence package.

    Protesilaos StavrouPublished

  100. Emacs: doric-themes version 1.1.0

    Minimalist themes for GNU Emacs to complement my ef-themes (maximalist) and modus-themes (moderate).

    Protesilaos StavrouPublished