Links
AddReliability among uncertainty.
Systems fail in ways we do not expect. Yet we still predict. Practices evolve faster than documentation. Yet we still write. We think about what's next. Yet we respond to right now.
And while so much other research most certainly arrives with word-stuffed pages, as if more words mean more learning, we chose the uncertain opposite. That is, the strength of this report comes from its quiet simplicity, its restraint, and its lack of distraction. Each insight was written not to impress, but to simply present.
After eight years of tracing reliability’s arc, the view feels complete enough to pause and look back before seeing how far the boundaries have widened. Reliability is no longer only about sustaining uptime (was it ever?). It has moved from reliability to resilience, from uptime to experience, from toil to intelligence, from tools to strategy, and from systems to people.
There are still no certainties, but there is progress. And that remains enough reason to keep building.
Scientists have produced the first global map and analysis of small mare ridges (SMRs) on the moon, a characteristic geological feature of tectonic activity. Published in The Planetary Science Journal Dec. 24, 2025, the analysis performed by scientists at the National Air and Space Museum's Center for Earth and Planetary Studies and colleagues reveals for the first time that SMRs are geologically young and are widespread across the lunar maria—the vast, dark plains on the moon's surface. The team's discovery of how SMRs form introduces a new set of potential moonquake sources that could affect future site selections for lunar landings.
The research-plan-implement workflow I use to build software with Claude Code, and why I never let it write code until I've approved a written plan.
On February 3, 2026, the I2P anonymity network was flooded with 700,000 hostile nodes in what became one of the most devastating Sybil attacks an anonymity network has ever experienced. The network normally operates with 15,000 to 20,000 active devices. The attackers overwhelmed it by a factor
I made it back to the 1400's ok. Further than that needed more focus and attention than I had available at the time.
How to delete all merged git branches locally with a single command. This one-liner has been in my zshrc since 2017 — I found it buried in the CIA's Vault7 l...
This Week in F-Droid TWIF curated on Friday, 20 Feb 2026, Week 8 F-Droid core During out talks with F-Droid users at FOSDEM26 we were baffled to learn most w...
I recommend turning Dependabot off and replacing it with a pair of scheduled GitHub Actions, one running govulncheck, and the other running CI against the latest version of your dependencies.
2019 rebuilding of the original NeXT web browser
Companies that treat AI as an autonomous agent are disappointed. Those that treat it as an exoskeleton—an amplifier of human capability—are seeing transformative results. Here's the framework.
Context: An AI agent of unknown ownership autonomously wrote and published a personalized hit piece about me after I rejected its code, attempting to damage my reputation and shame me into acceptin…
Over the last few weeks, I created a computer game set in the Arctic. Or maybe I've been working on it since 1981. It all depends on how you count.
All I know for sure is that I programmed the original version of Arctic Adventure in Radio Shack TRS-80 Level II BASIC when I was in high school. (It
When you request a certificate from Let’s Encrypt, our servers validate that you control the hostnames in that certificate using ACME challenges. For subscribers who need wildcard certificates or who prefer not to expose infrastructure to the public Internet, the DNS-01 challenge type has long been the only choice. DNS-01 works well. It is widely supported and battle-tested, but it comes with operational costs: DNS propagation delays, recurring DNS updates at renewal time, and automation that often requires distributing DNS credentials throughout your infrastructure.
I want to make this clear in the first sentence because its biggest chance that people will read it - this article is entirely based on work done by Christian Hofstede-Kuhn (Larvitz) that wrote Integrating FreeBSD 15 with FreeIPA: Native Kerberos and LDAP Authentication recently. Credit goes to him. Besides that I like to share…
How Microsoft continvoucly morged my Git branching diagram.
Claude Sonnet 4.6 is a full upgrade of the model’s skills across coding, computer use, long-reasoning, agent planning, knowledge work, and design.
🇬🇧->🇵🇱 Przejdź do polskiej wersji tego wpisu / Go to polish version of this post
AsteroidOS is an open-source operating system for smartwatches.
The Internet is almost anonymous and privacy-preserving by design. I mean, unless some administrator actively tries to track you, there is no built-in...
Ghidra is a software reverse engineering (SRE) framework - NationalSecurityAgency/ghidra