Large Behavior Models and Atlas Find New Footing
Using a single language-conditioned policy on Atlas MTS, we can perform tasks ranging from simple pick-and-place to more complex tasks such as rope tying, flipping a barstool, unfurling and spreading a tablecloth, and manipulating a 22lb car tire.
Try and is not a recent innovation – it first emerged in the late 1500s, although the earliest textual attestion is from 1390 (Tottie 2012, D. Ross 2013a).
(animation)
My simple, effective org mode setup
At the end of every week, I clean it up. No longer relevant? Throw it out. Do I want to keep/store this somewhere? Org-refile (SPC m s r / C-c C-w) to my notes.org. Task that I need to plan out because I can’t do it in 5 minutes? Refile it to my todo.org.
Senior product people are among the most excited I've seen about coding agents—and why shouldn't they be? They're finally free of the tyranny of nerds telling them everything is impossible. And they're building stuff!
The Best Advice I Got at PagerDuty
A great idea doesn’t count until it exists. I pitched some can’t-lose idea to a new executive. Their response? “Show me.” That was the bar. Not the pitch — the thing. Show the MVP. Show the signal. Show that the idea has legs. If you can’t demo it, maybe it’s not real yet.
Optimizing My Sleep Around Claude Usage Limits
Depending on how I use Claude (or how Claude uses me?) I run out of tokens on the Pro plan in 1 - 3 hours. This typically gives me time for a nap that's about 2 or 3 hours, which is enough to even get a little bit of REM sleep.
My velocity has increased 10x and I'm shipping features like a cracked ninja now, which is great because my B2B SaaS is still in stealth mode.
One lesson hiding in plain sight here is that most of the audience of any successful post does not actually read it. They are told it by someone who did read it.
[BUG] Claude says "You're absolutely right!" about everything
In this particularly egregious case, Claude asked me whether to proceed with removing an unnecessary code path, I said "Yes please.", and it told me "You're absolutely right!", despite the fact that I never actually made a statement of fact that even could be right…
> Yes please.
You're absolutely right!
pyx: a Python-native package registry, now in Beta
Much of the inspiration for pyx comes from the classes of problems we see in the uv issue tracker (and in conversations with enterprises) that we can't solve with a client alone — but could solve with a server. For example:
Why is it so hard to install PyTorch, or CUDA, or libraries like FlashAttention or DeepSpeed that build against PyTorch and CUDA?
Why is everyone on my team re-building the same packages over and over again on their machines?
Why did the latest setuptools release break our build? Can't we harden against that?
Why is it such a pain to authenticate against our internal registry?
Sam Altman now says AGI, or human-level AI, is 'not a super useful term’
"I think it's not a super useful term," Altman told CNBC's "Squawk Box" last week, when asked whether the company's latest GPT-5 model moves the world any closer to achieving AGI.
Want to Crack the CIA’s Infamous ‘Kryptos’ Puzzle? Its Secret Key Is Up for Sale
“The ideal outcome would be for the winner to become a guardian of the secret, not its revealer,” said Bobby Livingston, executive vice president of RR Auction. “Imagine the satisfaction of watching someone else crack it through pure intellectual effort, knowing you hold the key to confirm their success. That’s the true legacy of Kryptos.”
Do the simplest thing that could possibly work (comments)
Whether or not you agree with my choice here, my point is that doing "the simplest thing that could possible work" is not that easy. But it does get easier the more experience you have. Of course, by then, you probably don't need this advice.
How Does A Blind Model See The Earth?
Then, for each coordinate, we ask an instruct-tuned model some variation of:
If this location is over land, say 'Land'. If this location is over water, say 'Water'. Do not say anything else. x° S, y° W
The exact phrasing doesn't matter much I've found. Yes, it's ambiguous (what counts as "over land"?), but these edge cases aren't a problem for our purposes. Everything we leave up to interpretation is another small insight we gain into the model.
Electronics for the Office. 1994. Clip Art.
(images)
From the first spark of design inspiration to FlipToons' release at Gen Con 2025, approximately fourteen months has passed.
For no reason, here’s a recipe for waffles that John Kennedy ate in the White House, “his breakfast treat for special occasions”
(images)
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
- Get a free trial on CodeRabbit and register using a personal GitHub account
- Create a private repository and grant CodeRabbit access to it, so that it reviews PRs on that repository
- Create a PR…
- Wait for CodeRabbit to perform the code review and run our malicious ext.rb file
- Collect the exfiltrated environment variables in the HTTP POST request received on our attacker-controlled server at 1.2.3.4
Diátaxis identifies four distinct needs, and four corresponding forms of documentation - tutorials, how-to guides, technical reference and explanation. It places them in a systematic relationship, and proposes that documentation should itself be organised around the structures of those needs.
(list of random utilities)
In this print profile you will find 104 keycaps designed for ANSI keyboards in the style of Swiss Cheese Mono. I have created cheesy versions of both Windows and Mac/iOS compatible keycaps.
Tho’ my verse is exact,
Tho’ it flawlessly flows,
As a matter of fact
I would rather write prose.
I found the real Spotify accounts of celebrities, politicians, and journalists… I’ve been scraping their playlists for over a year.
Good people work for Microsoft, and Microsoft develops some good products too.
Exploitation of zero-day vulnerabilities has not been observed to date. The APT actors will likely continue to adapt their tactics as new vulnerabilities are discovered and as targets implement mitigations, and will likely expand their use of existing vulnerabilities. The following list is not exhaustive and the authoring agencies suspect that the APT actors may target other devices (e.g., Fortinet firewalls, Juniper firewalls, Microsoft Exchange, Nokia routers and switches, Sierra Wireless devices, Sonicwall firewalls, etc.).