frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Claude March 2026 usage promotion

https://support.claude.com/en/articles/14063676-claude-march-2026-usage-promotion
63•weldu•1h ago•38 comments

Show HN: Han – A Korean programming language written in Rust

https://github.com/xodn348/han
14•xodn348•22m ago•0 comments

Hostile Volume – A game about adjusting volume with intentionally bad UI

https://hostilevolume.com/
58•Velocifyer•3h ago•34 comments

Fedora 44 on the Raspberry Pi 5

https://nullr0ute.com/2026/03/fedora-44-on-the-raspberry-pi-5/
14•jandeboevrie•1h ago•0 comments

Marketing for Founders

https://github.com/EdoStra/Marketing-for-Founders
49•jimsojim•2h ago•7 comments

Montana passes Right to Compute act (2025)

https://www.westernmt.news/2025/04/21/montana-leads-the-nation-with-groundbreaking-right-to-compu...
221•bilsbie•7h ago•185 comments

Show HN: Ichinichi – One note per day, E2E encrypted, local-first

35•katspaugh•2h ago•15 comments

MCP is dead; long live MCP

https://chrlschn.dev/blog/2026/03/mcp-is-dead-long-live-mcp/
64•CharlieDigital•2h ago•56 comments

It's time to move your docs in the repo

https://www.dein.fr/posts/2026-03-13-its-time-to-move-your-docs-in-the-repo
73•gregdoesit•2h ago•47 comments

Baochip-1x: What it is, why I'm doing it now and how it came about

https://www.crowdsupply.com/baochip/dabao/updates/what-it-is-why-im-doing-it-now-and-how-it-came-...
245•timhh•3d ago•36 comments

Offloading FFmpeg with Cloudflare

https://kentcdodds.com/blog/offloading-ffmpeg-with-cloudflare
5•heftykoo•4d ago•0 comments

An ode to bzip

https://purplesyringa.moe/blog/an-ode-to-bzip/
69•signa11•5h ago•44 comments

A Recursive Algorithm to Render Signed Distance Fields

https://pointersgonewild.com/2026-03-06-a-recursive-algorithm-to-render-signed-distance-fields/
12•surprisetalk•3d ago•3 comments

Python: The Optimization Ladder

https://cemrehancavdar.com/2026/03/10/optimization-ladder/
232•Twirrim•4d ago•81 comments

Show HN: GitAgent – An open standard that turns any Git repo into an AI agent

https://www.gitagent.sh/
72•sivasurend•8h ago•7 comments

Sunsetting Jazzband

https://jazzband.co/news/2026/03/14/sunsetting-jazzband
106•mooreds•4h ago•37 comments

CSMWrap: Legacy BIOS booting on UEFI-only systems via SeaBIOS

https://github.com/CSMWrap/CSMWrap
13•_joel•4d ago•3 comments

GIMP 3.2 released

https://www.gimp.org/news/2026/03/14/gimp-3-2-released/
152•F3nd0•1h ago•36 comments

9 Mothers Defense (YC P26) Is Hiring in Austin

https://jobs.ashbyhq.com/9-mothers?utm_source=x8pZ4B3P3Q
1•ukd1•8h ago

Generalizing Knuth's Pseudocode Architecture From Algorithms to Knowledge

https://www.researchgate.net/publication/401189185_Towards_a_Generalization_of_Knuth%27s_Pseudoco...
22•isomorphist•3d ago•1 comments

Show HN: Learn Arabic with spaced repetition and comprehensible input

https://abjadpro.com
55•adangit•5h ago•12 comments

Library of Short Stories

https://www.libraryofshortstories.com/
3•debo_•1h ago•0 comments

XML is a cheap DSL

https://unplannedobsolescence.com/blog/xml-cheap-dsl/
215•y1n0•9h ago•223 comments

Life as an OnlyFans 'chatter'

https://www.bbc.com/news/articles/cq571g9gd4lo
110•1659447091•3d ago•132 comments

Megadev: A Development Kit for the Sega Mega Drive and Mega CD Hardware

https://github.com/drojaazu/megadev
108•XzetaU8•12h ago•5 comments

Nmap in the movies (2008)

https://nmap.org/movies/
135•homebrewer•5h ago•18 comments

Starlink militarization and its impact on global strategic stability

https://interpret.csis.org/translations/starlink-militarization-and-its-impact-on-global-strategi...
95•msuniverse2026•12h ago•117 comments

1M context is now generally available for Opus 4.6 and Sonnet 4.6

https://claude.com/blog/1m-context-ga
1090•meetpateltech•1d ago•467 comments

2026 tech layoffs reach 45,000 in March

https://technode.global/2026/03/09/2026-tech-layoffs-reach-45000-in-march-more-than-9200-due-to-a...
119•ninadwrites•2h ago•90 comments

What happens when US economic data becomes unreliable

https://mitsloan.mit.edu/ideas-made-to-matter/what-happens-when-us-economic-data-becomes-unreliable
281•inaros•4h ago•271 comments
Open in hackernews

Path is a utility for working with paths

https://gitlab.com/SpyrjaGaldr/path
60•spyrja•10mo ago
A recent post here got me thinking about my own personal gripes with OS path handling offerings. So I've basically spent the passed couple of days working on a little project in an attempt to rectify the situation somewhat (in the spirit of cross-platform development). It should also work pretty well with existing tools. Let me know what you think, and feel free to open an issue or a pull-request if you have any problems getting it running it on your system. Enjoy!

Github link: https://github.com/SpyrjaGaldr/path

https://simonsafar.com/2025/path_as_system_call/

https://news.ycombinator.com/item?id=43788728

Comments

vesinisa•10mo ago
What can this do that standard Unix find can not do?
autobodie•10mo ago
cross platform support, according to the description.
indemnity•10mo ago
fd exists https://github.com/sharkdp/fd
spyrja•10mo ago
Looks like it has a pretty good interface as well. It does however seem a just a bit too top-heavy (lot's of dependencies) not to mention a few more bugs than I particularly care for. But sheesh, 37K stars, it must be good for something!
blooalien•10mo ago
> ... "it must be good for something!"

It's good for finding files fast, and piping the resulting file paths into other tools for further action / handling. It does what it claims to do and does it well. :)

spyrja•10mo ago
I would say the default behaviour just isn't very ergonomic. Suppressing warnings for example requires piping to /dev/null (whereas `path` supresses permission warnings by default), if you want to limit the number of results you have to pipe the output to another command, getting xargs-like behaviour (obviously), or putting quotes around lines with embedded spaces, there are simply more hoops to jump through. It's much easier to type "path -sf .jpg .jpeg .png" than whatever would be required to get the `find` utility to do the same. (Or, say, finding all node_modules folders with "path -z n_m", it's just so much more satisfying.) But yes, these are mostly just syntactic-sugar kinds of issues. Aside from that (and perhaps the lack of cross-platform compatibility), I would say there is nothing inherently deficient about the `find` command. It's a work-horse which probably has more features than `path` does. But the latter really is growing on me. It is actually quite fun to use, if I may say so myself!
jimbokun•10mo ago
“A more ergonomic find command” is a nice elevator pitch.
pimlottc•10mo ago
From the name and description, I expected this to perform operations on file path strings, like convert relative to absolute (and vice versa), expand symlinks, convert unix paths to dos, etc. This is more like a find command.
spyrja•10mo ago
I don't see why it necessarily couldn't, my only question would be if there are really many actual use cases for such things? As far as symlinks go, I suppose being able to expand them (but not following them!) might be somewhat useful. But converting to DOS paths and vice-versa? That just doesn't seem very useful. Nevermind converting to-and-fro relative and absolute paths, I can't even imagine what the point of that would be. But perhaps I'm just not seeing the forest for the trees, as they say.
qrobit•10mo ago
As a rule of thumb I always make paths absolute when handling files in scripts. But then sometimes I need to copy a directory tree relative to $CWD somewhere else, so I convert them back to relative

Fish, being a great shell, provides this via `path` command[0]

[0]: https://fishshell.com/docs/current/cmds/path.html

jl6•10mo ago
> for the primary purpose of helping other programs know where to find stuff

Potential footgun to make a program rely on this to locate, say, a shared library (as in one of the examples), if there’s a possibility that someone has smuggled a malware’d version of it into, say, /tmp, since it defaults to searching the root directory.

spyrja•10mo ago
Kind of, but also kind of not. I mean if someone can smuggle a file into some random directory, chances are they have enough access to write directly to the "correct" folder to begin with. Personally I wouldn't execute or otherwise load any sort of executable content from a non-root directory (although certainly there are many people who wouldn't even think twice before doing such a thing). So it really just boils down to having a sane security-policy. Restrict searches with something like "path -d /usr *" and you are guaranteed not to scoop-up something that was world-writable in the first place. In fact in the example given in the README, that is precisely how that would have worked. Both /lib32 and /lib64 are owned by "root" and hence not a concern.
jl6•10mo ago
Naturally every footgun is guaranteed to be safe as long as you use it right :)

I wonder if a safer default would be to start searches at the current directory rather than the root directory?

spyrja•10mo ago
I did actually consider that at one point, but eventually decided against it because I felt would have meant a sacrifice in performance; first you'd do the local search, then start at the very top and recurse back down, checking every single entry against the local path to be sure that you don't do the local traversal all over again. Fortunately the code base is very clean and straight-forward, so it would be a fairly trivial excercise to just fork the repo and make those changes yourself to get that kind of behaviour.
spyrja•10mo ago
Well I ran a bunch of tests and it turns out that the performance wasn't actually impacted very much after all. So the changes are official. I also made some other adjustments to the default behaviour; if no pattern is specified then it just matches everything. In other words, "path -f" prints every regular file in the filesystem (starting in the current one). Anyway, thanks for the suggestion, otherwise I may not gone down that (decidedly satisfying) rabbit-hole!
account-5•10mo ago
I've been finding nushell's `ls` with a where clause is pretty good for this. There's also the `find` command too.