frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Apple Wants You to Follow Crazy Procedure for Battery Replacement on the M5 MBP

https://www.ifixit.com/News/114046/m5-macbook-pro-teardown
1•gnabgib•5m ago•0 comments

The Book to Buy in Bulk for Public Health Officials

https://thetyee.ca/Culture/2025/10/24/Book-Buy-Bulk-Public-Health-Officials/
1•mathgenius•10m ago•0 comments

Enhancing FineIBT

https://lwn.net/Articles/1039633/
1•pykello•18m ago•0 comments

How the brain's activity, energy use and blood flow change as people fall asleep

https://www.massgeneralbrigham.org/en/about/newsroom/press-releases/research-shows-coordinated-sh...
1•XzetaU8•20m ago•0 comments

Cross-Agent Privilege Escalation: When Agents Free Each Other

https://embracethered.com/blog/posts/2025/cross-agent-privilege-escalation-agents-that-free-each-...
1•vinhnx•30m ago•0 comments

The Suppliers Behind the Apple Pencil Pro

https://quartr.com/insights/company-research/the-suppliers-behind-the-apple-pencil-pro
1•o4c•36m ago•0 comments

The Goon Squad

https://harpers.org/archive/2025/11/the-goon-squad-daniel-kolitz-porn-masturbation-loneliness/
1•ericzawo•37m ago•0 comments

EU accuses Meta of failing to police illegal content online

https://www.ft.com/content/d914e7a3-c008-4eca-bd3f-dab0f8ef673c
3•1vuio0pswjnm7•40m ago•0 comments

Understanding the Semiconductor Value Chain: Key Players and Dynamics

https://quartr.com/insights/company-research/understanding-the-semiconductor-value-chain-key-play...
1•o4c•42m ago•0 comments

Some "Silicon Valley" moments I experienced in my 31 year career as a programmer

https://old.reddit.com/r/bayarea/comments/1ofdap5/some_silicon_valley_moments_i_experienced_in_my/
2•elsewhen•42m ago•0 comments

Wafer-Scale AI Compute: A System Software Perspective

https://www.sigops.org/2025/wafer-scale-ai-compute-a-system-software-perspective/
1•matt_d•43m ago•0 comments

AT&T Promo Codes and Bundle Deals: Save $50 in November

https://www.wired.com/story/att-promo-code/
2•fleahunter•43m ago•0 comments

IBM-says-it-can-run-its-quantum-algorithm-on-AMD-chips

https://www.scworld.com/news/ibm-says-it-can-run-its-quantum-algorithm-on-amd-chips
1•IFR•46m ago•1 comments

People in strong relationships ask this No. 1 question early on

https://www.cnbc.com/2025/10/24/the-no-1-question-every-couple-should-ask-early-on-in-their-relat...
1•libpcap•53m ago•0 comments

Vintage Mac Catalog Library

https://vintageapple.org/catalogs/
1•evo_9•55m ago•0 comments

Armed police handcuff teen after AI mistakes crisp packet for gun in US

https://www.bbc.com/news/articles/cgjdlx92lylo
1•dskhatri•58m ago•1 comments

SuperSonic: SuperCollider in the Browser

https://sonic-pi.net/supersonic/demo.html
1•mstep•1h ago•0 comments

Neural Networks by Hand: No Code, Just Color and Math

https://www.youtube.com/watch?v=c-g-sIu7b3g
4•HenryAI•1h ago•1 comments

Implementing an RPN Calculator in Rust

https://beej.us/blog/data/rust-rpn-calc/
1•zdw•1h ago•0 comments

Mistakes I see engineers making in their code reviews

https://www.seangoedecke.com/good-code-reviews/
2•zdw•1h ago•0 comments

Wheeled Inverted Pendulum Model

https://scaron.info/robotics/wheeled-inverted-pendulum-model.html
1•pillars•1h ago•0 comments

Nike Unveils Project Amplify, the First Powered-Footwear System

https://about.nike.com/en-GB/newsroom/releases/nike-unveils-project-amplify-the-worlds-first-powe...
3•ksec•1h ago•1 comments

Nexperia China defies Dutch head office's order to remove veteran Chinese exec

https://www.scmp.com/tech/tech-war/article/3330152/nexperia-china-defies-dutch-head-offices-order...
2•ksec•1h ago•0 comments

Postgres for Agents

https://www.tigerdata.com/blog/postgres-for-agents
2•akulkarni•1h ago•0 comments

Marc Andreessen says the movie Oppenheimer misunderstands history and morality

https://twitter.com/a16z/status/1981794268235850217
3•keepamovin•1h ago•0 comments

Paratyphoid fever and relapsing fever in 1812 Napoleon's devastated army

https://www.cell.com/current-biology/fulltext/S0960-9822%2825%2901247-3
1•Hooke•1h ago•0 comments

Global Consciousness Project

https://en.wikipedia.org/wiki/Global_Consciousness_Project
2•Caeiro•1h ago•0 comments

Meet the real screen addicts: the elderly

https://www.economist.com/international/2025/10/23/meet-the-real-screen-addicts-the-elderly
3•johntfella•1h ago•0 comments

Tech PACs Are Closing in on the Almonds

https://www.astralcodexten.com/p/tech-pacs-are-closing-in-on-the-almonds
2•paulpauper•1h ago•0 comments

Fire Yourself First: The E-Myth Approach to Iteratively AI App Development

http://arcturus-labs.com/blog/2025/01/17/fire-yourself-first-the-e-myth-approach-to-iteratively-a...
2•JnBrymn•1h ago•0 comments
Open in hackernews

Univ. of California faculty push back against Big Brother cybersecurity mandate

https://www.science.org/content/article/university-california-faculty-push-back-against-big-brother-cybersecurity-mandate
10•bikenaga•12h ago

Comments

pletsch•11h ago
The article says Trellix but the same could be written about any EDR from a capability standpoint. To add to the staff's point about giving root access, and while that's more on Microsoft needing to get vendors out of the kernel, it shouldn't be a compromise users have to make.

With that said, I find myself agreeing with the mandate, if you're using university resources, they have a responsibility to protect those resources and EDR is table stakes these days.. but they also need to be providing any devices required for the job, allowing BYOD for restricted data makes an already tough environment to secure harder than it needs to be.

jltsiren•10h ago
There is a complicating factor. Universities are not your average top-down hierarchies. While some aspects of the work do belong to the employer, other aspects are yours (or you PI's), and they may follow you to your next job. While administrative matters and sensitive data tend to belong to the university, everything you create as an academic is usually yours.

It's pretty common, particularly among researchers who do not handle sensitive data, to have a burner laptop for accessing university resources and personal devices for the actual work. Many people also use personal email addresses for work. Work email rarely survives changes in employment, making it too short-lived for many purposes.

mindslight•52m ago
If top-down surveillance spyware has become "table stakes", then it's time to flip the table.