bluesky
Latest Stories
Apple debuts M5 Pro and M5 Max to supercharge the most demanding pro workflows
Apple debuts M5 Pro and M5 Max to supercharge the most demanding pro workflows
Someone Needs to Go to Jail
Someone Needs to Go to Jail
The AI Bubble Is an Information War
The AI Bubble Is an Information War
Evolving the ACM Digital Library
Evolving the ACM Digital Library
The transition to open access, Basic, and Premium is not a completed project—it is an evolving framework.
Claude is an Electron App because we've lost native
Claude is an Electron App because we've lost native
Show HN: Effective Git
Show HN: Effective Git
GPT‑5.3 Instant
GPT‑5.3 Instant
Show HN: Open-Source Article 12 Logging Infrastructure for the EU AI Act
Show HN: Open-Source Article 12 Logging Infrastructure for the EU AI Act
Gemini 3.1 Flash-Lite: Built for intelligence at scale
Gemini 3.1 Flash-Lite: Built for intelligence at scale
I Used Claude to File My Taxes for Free
I Used Claude to File My Taxes for Free
Points on a ring: An interactive walkthrough of a popular math problem
Points on a ring: An interactive walkthrough of a popular math problem
Arm's Cortex X925: Reaching Desktop Performance
Arm's Cortex X925: Reaching Desktop Performance
A [Firefox, Chromium] extension that converts Microsoft to Microslop
A [Firefox, Chromium] extension that converts Microsoft to Microslop
Disable Your SSH access accidentally with scp
Disable Your SSH access accidentally with scp
The Hidden Price Tag: Uncovering Hidden Costs in Cloud Architectures with the AWS Well-Architected Framework
The Hidden Price Tag: Uncovering Hidden Costs in Cloud Architectures with the AWS Well-Architected Framework
In this post, we discuss how following the AWS Cloud Adoption Framework (AWS CAF) and AWS Well-Architected Framework can help reduce these risks through proper implementation of AWS guidance and best practices while taking into consideration the practical challenges organizations face in implementing these best practices, including resource constraints, evaluating trade-offs and competing business priorities.
Show HN: React-Kino – Cinematic scroll storytelling for React (1KB core)
Show HN: React-Kino – Cinematic scroll storytelling for React (1KB core)
Apple introduces the new MacBook Air with M5
Apple introduces the new MacBook Air with M5
See risk, fix risk: introducing Remediation in Cloudflare CASB
See risk, fix risk: introducing Remediation in Cloudflare CASB
Cloudflare CASB Remediation lets security teams go beyond visibility to fix risky file sharing in Microsoft 365 and Google Workspace directly from Cloudflare One, all in just a few clicks.
Evolving Cloudflare’s Threat Intelligence Platform: actionable, scalable, and ETL-less
Evolving Cloudflare’s Threat Intelligence Platform: actionable, scalable, and ETL-less
Stop managing ETL pipelines and start threat hunting. Introducing new visualization, automation, and enrichment tools in the Cloudflare Threat Intelligence Platform to turn massive telemetry into instant security posture.
Introducing the 2026 Cloudflare Threat Report
Introducing the 2026 Cloudflare Threat Report
There has been a fundamental shift toward industrialized cyber threats, highlighted by a record 31.4 Tbps DDoS attack and sophisticated session token theft. Our new report examines how nation-states and criminal actors have moved beyond traditional exploits to "living off the XaaS" within legitimate enterprise logic.