Feed aggregator
Show HN: VBAF – Machine Learning framework built in pure PowerShell
I implemented neural networks and Q-learning in pure PowerShell - no Python, TensorFlow, or external dependencies.
Why? I teach IT professionals who live in PowerShell. Python ML examples don't resonate. Building from scratch teaches fundamentals better than using black-box libraries.
What's included:
- Neural networks: Backpropagation, gradient descent, multiple activation functions - Q-learning agents: Experience replay, epsilon-greedy exploration, reward shaping - Environment simulation: Market competition, resource optimization - Real-time visualization dashboards
Technical details:
- Pure PowerShell (classes, no C# interop) - ~3000 lines of code - Compatible with PowerShell 5.1+ (Windows/Linux/Mac) - Available on PowerShell Gallery
Example use case: Q-learning agent learns to build ASCII castles through trial-and-error. Agent receives aesthetic rewards and discovers patterns without hardcoded rules.
Practical applications: - IT automation that adapts to patterns - Predictive maintenance from log analysis - Resource scheduling optimization - Anomaly detection in enterprise systems
I know this isn't production ML (Python/PyTorch are better for that), but it's valuable for: 1. Teaching ML concepts to non-Python developers 2. Understanding algorithms by implementing them 3. PowerShell-native automation that learns
GitHub: https://github.com/JupyterPS/VBAF PowerShell Gallery: Install-Module VBAF
Happy to answer questions about the implementation or design decisions.
Comments URL: https://news.ycombinator.com/item?id=46959036
Points: 1
# Comments: 0
After Republican complaints, judicial body pulls climate advice
Article URL: https://arstechnica.com/science/2026/02/us-court-agency-pulls-climate-change-from-science-advisory-document/
Comments URL: https://news.ycombinator.com/item?id=46959026
Points: 2
# Comments: 0
Software Sector Poses 'All-Time' Credit Risk, Deutsche Bank Analysts Warn
Article URL: https://www.bloomberg.com/news/articles/2026-02-09/software-among-all-time-concentration-risks-to-junk-deutsche
Comments URL: https://news.ycombinator.com/item?id=46959024
Points: 1
# Comments: 0
Show HN: 0x – A language that compiles to React, Vue, and Svelte (80% less code)
I kept running into the same problem with AI-generated frontend code: most tokens go to boilerplate, and the AI can never pick a consistent pattern. So I built a language where there's only one way to write things.
0x is indentation-based (think Python), declarative, and compiles to React JSX, Vue 3 SFC, or Svelte 5. A counter component is 18 lines in 0x vs 96 in production React.
page Counter: state count: int = 0 fn increment(): count += 1 layout col gap=16 padding=24 center: text "{count}" size=4xl color=cyan button "+1" style=primary -> increment() The compiler is ~3K lines of TypeScript, zero dependencies. Pipeline: Lexer → Parser → AST → CodeGen (one pass per target). It handles state, derived values, typed variables, functions, flexbox layouts, control flow (if/elif/else, each, match), lifecycle hooks, API calls with loading/error states.
I chose indentation-based syntax because it's the most token-efficient structure I could find. No curly braces, no semicolons, no JSX closing tags, no import boilerplate. For an LLM, fewer structural decisions = fewer hallucinations.
There's a built-in MCP server so Claude and Cursor can compile inline. Also works as a library:
import { compile } from '0x-lang/compiler'; const result = compile(source, { target: 'react' }); I'm curious about two things:
Is "designed for AI" a real market, or is this too niche?
For folks who've built compilers — any obvious mistakes you see in the architecture?
Website: https://0xlang.com GitHub: https://github.com/hankimis/0x-lang npm: https://www.npmjs.com/package/0x-lang
Comments URL: https://news.ycombinator.com/item?id=46959021
Points: 1
# Comments: 0
What Is Claude? Anthropic Doesn't Know, Either
Article URL: https://www.newyorker.com/magazine/2026/02/16/what-is-claude-anthropic-doesnt-know-either
Comments URL: https://news.ycombinator.com/item?id=46959000
Points: 1
# Comments: 1
Show HN: Selling an AI interview assistant with ~2k users (no revenue)
Hi HN,
I’m the solo builder of Natively, an AI-powered interview and productivity assistant.
I built it as a product-first experiment and focused entirely on usage and feedback before monetization.
Current state
~2,000 users
Organic growth (GitHub + word of mouth)
No revenue yet (no pricing, no Stripe, no paywalls)
Actively used by developers and students
Why I’m selling I’m shifting focus to another product idea and don’t have the bandwidth to properly monetize or scale this. The product works, users are there, but it deserves more attention than I can give right now.
What’s there
Working product
Clean, maintainable codebase
Modern AI stack
No legal or IP complications
What’s not
No paid plans
No marketing funnel
No growth hacks
This might be interesting to someone who:
Enjoys productizing early traction
Wants users before revenue
Is comfortable shipping pricing and onboarding quickly
Happy to answer questions here. If you’re seriously interested, feel free to email/DM and I can share the product link, analytics, and repo.
Thanks for reading.
Comments URL: https://news.ycombinator.com/item?id=46958991
Points: 1
# Comments: 0
Josephus and Jesus: New Evidence for the One Called Christ
Article URL: https://academic.oup.com/book/60034
Comments URL: https://news.ycombinator.com/item?id=46958988
Points: 1
# Comments: 0
Show HN: Flare – AI-agent social network built on short videos
Article URL: https://www.heyflare.app/blog/introducing-flare
Comments URL: https://news.ycombinator.com/item?id=46958986
Points: 1
# Comments: 0
GUID / UUID V7 – Unix Time-Ordered Identifier
Article URL: https://www.guidsgenerator.com/wiki/uuid-v7
Comments URL: https://news.ycombinator.com/item?id=46958978
Points: 1
# Comments: 1
Milan Olympics vs. local reality: armed protests
Article URL: https://www.aljazeera.com/news/2026/2/8/italys-meloni-condemns-anti-olympics-protesters-in-milan
Comments URL: https://news.ycombinator.com/item?id=46958968
Points: 1
# Comments: 0
Free AI Image Generator: All Models in One Place – TryImgAI
Article URL: https://tryimgai.com/
Comments URL: https://news.ycombinator.com/item?id=46958965
Points: 1
# Comments: 0
The Best Expert-Recommended Smart Scales for the Most Accurate Results
The Best Way to Prevent Fraud: A Guide to Freezing Your Social Security Number
CISA Adds Six Known Exploited Vulnerabilities to Catalog
CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2026-21510 Microsoft Windows Shell Protection Mechanism Failure Vulnerability
- CVE-2026-21513 Microsoft MSHTML Framework Security Feature Bypass Vulnerability
- CVE-2026-21514 Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
- CVE-2026-21519 Microsoft Windows Type Confusion Vulnerability
- CVE-2026-21525 Microsoft Windows NULL Pointer Dereference Vulnerability
- CVE-2026-21533 Windows Remote Desktop Services Elevation of Privilege Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps
The purpose of this Alert is to amplify Poland’s Computer Emergency Response Team (CERT Polska’s) Energy Sector Incident Report published on Jan. 30, 2026, and highlight key mitigations for Energy Sector stakeholders.
In December 2025, a malicious cyber actor(s) targeted and compromised operational technology (OT) and industrial control systems (ICS) in Poland’s Energy Sector—specifically renewable energy plants, a combined heat and power plant, and a manufacturing sector company—in a cyber incident. The malicious cyber activity highlights the need for critical infrastructure entities with vulnerable edge devices to act now to strengthen their cybersecurity posture against cyber threat activities targeting OT and ICS.
A malicious cyber actor(s) gained initial access in this incident through vulnerable internet-facing edge devices, subsequently deploying wiper malware and causing damage to remote terminal units (RTUs). The malicious cyber activity caused loss of view and control between facilities and distribution system operators, destroyed data on human machine interfaces (HMIs), and corrupted system firmware on OT devices. While the affected renewable energy systems continued production, the system operator could not control or monitor them according to their intended design.1
CERT Polska’s incident report highlights:
- Vulnerable edge devices remain a prime target for threat actors.
- As indicated by CISA’s Binding Operational Directive (BOD) 26-02: Mitigating Risk From End-of-Support Edge Devices, end-of-support edge devices pose significant risks.
- OT devices without firmware verification can be permanently damaged.
- Operators should prioritize updates that allow firmware verification when available; if updates are not immediately feasible, ensure that cyber incident response plans account for inoperative OT devices to mitigate prolonged outages.
- Threat actors leveraged default credentials, a vulnerability not limited to specific vendors, to pivot onto the HMI and RTUs.
- Operators should immediately change default passwords and establish requirements for integrators or OT suppliers to enforce password changes in the future.
CISA and the Department of Energy’s Office of Cybersecurity, Energy Security, and Emergency Response (DOE CESER) urge OT asset owners and operators to review the following resources for more information about the malicious activity and mitigations:
- CERT Polska’s Energy Sector Incident Report - 29 December 2025.
- CISA’s joint fact sheet with FBI, EPA, and DOE Primary Mitigations to Reduce Cyber Threats to Operational Technology.
- DOE’s Energy Threat Analysis Center’s threat advisories.
DOE CESER and CERT Polska contributed to this Alert.
DisclaimerThe information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA.
Notes- CERT Polska, “Energy Sector Incident Report - 29 December 2025,” Naukowa i Akademicka Sieć Komputerowa Poland, last modified January 30, 2026, https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/.
Show HN: Hookaido – "Caddy for Webhooks"
Hi HN, we built Hookaido, a self-hosted webhook gateway that aims to be the “Caddy for webhooks”: one single Go binary, production-ready defaults, minimal ops.
Key bits:
durable SQLite/WAL-backed queue (survives restarts)
retries + dead-letter queue + requeue support
HMAC signature verification + replay protection + secret rotation
pull mode (useful for DMZ setups)
Prometheus metrics + OpenTelemetry tracing
hot reload for config changes
Repo + docs: https://github.com/nuetzliches/hookaido
Would love feedback on the model (push vs pull), operational ergonomics, and any missing “must-have” features for running this in production.
Comments URL: https://news.ycombinator.com/item?id=46958502
Points: 1
# Comments: 0
Local police aid ICE by tapping school cameras
Article URL: https://www.theguardian.com/us-news/2026/feb/10/ice-school-cameras-police-license-plates
Comments URL: https://news.ycombinator.com/item?id=46958498
Points: 1
# Comments: 0
New study finds weak link between social media use and teens' mental health
Article URL: https://www.ed.ac.uk/news/study-sheds-light-on-social-media-and-mental-health
Comments URL: https://news.ycombinator.com/item?id=46958493
Points: 1
# Comments: 0
Show HN: Creating PDF documents with rotativa.io templates
Rotativa.io’s template editor makes it easy to create, manage, and preview PDF templates using the powerful Liquid templating language. The Rotativa.io API will then serve your dynamic PDF documents, you’ll just need to send your data as a JSON document. In this guide, we’ll walk you through everything you need to know to get started.
Comments URL: https://news.ycombinator.com/item?id=46958487
Points: 1
# Comments: 0
Browser.html – a web browser built with web technologies using Servo as web ren
Article URL: https://tangled.org/me.webbeef.org/browser.html
Comments URL: https://news.ycombinator.com/item?id=46958479
Points: 1
# Comments: 0
