Feed aggregator
The Handwriting of Simone Weil
Article URL: https://registerofaliens.substack.com/p/on-the-handwriting-of-simone-weil
Comments URL: https://news.ycombinator.com/item?id=47345989
Points: 1
# Comments: 0
Ask HN: Im looking for indie hackers or small teams to test AI analytics tool
I’m the founder of Pluk, a native AI database client.
I’ve been working on a new feature that lets you create agentic data notebooks on top of your own databases, and then turn those analyses into interactive dashboards. You can ask questions in plain language, run deeper SQL or Python-style workflows when you need to, and keep everything—from quick explorations to “real” reports—in one place.
The key difference: Pluk runs locally on your machine, directly against your own data. That means: - Your data never has to leave your environment for some third‑party cloud service. - You don’t need yet another expensive per‑seat analytics subscription just to explore or share metrics. - Performance is predictable and under your control, instead of being limited by a multi‑tenant SaaS backend.
My goal is to make it feel like you have a powerful AI analytics workspace—agentic notebooks, charts, and dashboards—but without the usual overhead of spinning up a whole separate cloud platform.
I’m looking for indie hackers and small teams who want to try this out early, use it on their real data, and give candid feedback on what works and what’s missing :)
Comments URL: https://news.ycombinator.com/item?id=47345944
Points: 1
# Comments: 0
Ig Nobel Prize flees US for Switzerland over safety concerns
Article URL: https://www.theregister.com/2026/03/11/ig_nobel_prize_leaves_us/
Comments URL: https://news.ycombinator.com/item?id=47345930
Points: 3
# Comments: 1
Big Data on the Cheapest MacBook
Article URL: https://duckdb.org/2026/03/11/big-data-on-the-cheapest-macbook
Comments URL: https://news.ycombinator.com/item?id=47345920
Points: 1
# Comments: 1
Why corporate lawyers always win
Article URL: https://www.economist.com/business/2026/03/11/why-corporate-lawyers-always-win
Comments URL: https://news.ycombinator.com/item?id=47345883
Points: 1
# Comments: 0
New hack model "went scuba"
Article URL: https://a-z.md/posts/jn7bwaz3b1vpj7t98pw3kmgw4s82r58v
Comments URL: https://news.ycombinator.com/item?id=47345882
Points: 1
# Comments: 0
Carnian Pluvial Episode
Article URL: https://en.wikipedia.org/wiki/Carnian_pluvial_episode
Comments URL: https://news.ycombinator.com/item?id=47345881
Points: 1
# Comments: 0
Age-Verification in Operating Systems and the Internet
Article URL: https://wiki.alcidesfonseca.com/blog/age-verification-in-operating-systems-and-the-internet/
Comments URL: https://news.ycombinator.com/item?id=47345873
Points: 2
# Comments: 0
Today's NYT Mini Crossword Answers for Thursday, March 12
Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability
A vulnerability in the handling of an Egress Packet Network Interface (EPNI) Aligner interrupt in Cisco IOS XR Software for Cisco Network Convergence System (NCS) 5500 Series with NC57 line cards and Cisco NCS 5700 Routers and Cisco IOS XR Software for Third Party Software could allow an unauthenticated, remote attacker to cause the network processing unit (NPU) and ASIC to stop processing, preventing traffic from traversing the interface.
This vulnerability is due to the corruption of packets in specific cases when an EPNI Aligner interrupt is triggered while an affected device is experiencing heavy transit traffic. An attacker could exploit this vulnerability by sending a continuous flow of crafted packets to an interface of the affected device. A successful exploit could allow the attacker to cause persistent, heavy packet loss, resulting in a denial of service (DoS) condition.
Note: If active exploitation of this vulnerability is suspected, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider.
Cisco has assigned this security advisory a Security Impact Rating (SIR) of High rather than Medium as the score indicates. This change was made because the affected device operates within a critical network segment where compromise could lead to significant disruption or exposure, thereby elevating the overall risk beyond the base technical severity.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrncs-epni-int-dos-TWMffUsN
This advisory is part of the March 2026 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2026 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication.
<br/>Security Impact Rating: High <br/>CVE: CVE-2026-20118Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Finesse, Cisco Packaged Contact Center Enterprise (Packaged CCE), Cisco Unified Contact Center Enterprise (Unified CCE), Cisco Unified Contact Center Express (Unified CCX), and Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.
These vulnerabilities exist because the web-based management interface of an affected system does not sufficiently validate user-supplied input. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-xss-MrNAH5Jh
Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities
Multiple vulnerabilities in Cisco IOS XR Software could allow an authenticated, local attacker to execute commands as root on an underlying operating system or gain full administrative control of an affected device.
For more information about these vulnerabilities, see the Details section of this advisory.
Cisco has released software updates that address these vulnerabilities. A workaround is available for one of the vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-privesc-bF8D5U4W
This advisory is part of the March 2026 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2026 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication.
<br/>Security Impact Rating: High <br/>CVE: CVE-2026-20040,CVE-2026-20046Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability
A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) multi-instance routing feature of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the IS-IS process to restart unexpectedly.
This vulnerability is due to insufficient input validation of ingress IS-IS packets. An attacker could exploit this vulnerability by sending crafted IS-IS packets to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the IS-IS process to restart unexpectedly, resulting in a temporary loss of connectivity to advertised networks and a denial of service (DoS) condition.
Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and must have formed an adjacency.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-dos-kDMxpSzK
This advisory is part of the March 2026 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2026 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication.
<br/>Security Impact Rating: High <br/>CVE: CVE-2026-20074Atlassian slashes 10% of workforce to 'self-fund' investments in AI
Article URL: https://www.cnbc.com/2026/03/11/atlassian-slashes-10percent-of-workforce-to-self-fund-investments-in-ai.html
Comments URL: https://news.ycombinator.com/item?id=47345732
Points: 1
# Comments: 0
Prioritizing energy intelligence for sustainable growth
Article URL: https://www.technologyreview.com/2026/03/10/1133972/prioritizing-energy-intelligence-for-sustainable-growth/
Comments URL: https://news.ycombinator.com/item?id=47345702
Points: 1
# Comments: 0
Protective Dome for AI Agents – MCP Security Gateway
Article URL: https://github.com/Orellius/mcpdome
Comments URL: https://news.ycombinator.com/item?id=47345696
Points: 1
# Comments: 0
Laminae – Multi-Agent Cognitive Pipeline
Article URL: https://github.com/Orellius/Laminae
Comments URL: https://news.ycombinator.com/item?id=47345689
Points: 1
# Comments: 0
Bringing the genetically minimal cell to life on a computer in 4D
Article URL: https://www.cell.com/cell/fulltext/S0092-8674(26)00174-1
Comments URL: https://news.ycombinator.com/item?id=47345674
Points: 1
# Comments: 0
Generative AI Vegetarianism
Article URL: https://sboots.ca/2026/03/11/generative-ai-vegetarianism/
Comments URL: https://news.ycombinator.com/item?id=47345631
Points: 1
# Comments: 0
Creaseless Foldable: Oppo Did What Samsung Couldn't [video]
Article URL: https://www.youtube.com/watch?v=V5a6qvETnNg
Comments URL: https://news.ycombinator.com/item?id=47345619
Points: 1
# Comments: 0
