šŸš€ Early Access! Many things may still not work as I refactor the site and make improvements. - Learn more

2025-03-25

The Death of Product Development as We Know it

Goodbye three-legged stool, 2-pizza teams, and ā€œmanagersā€Much has been written about what AI’s magical powers can enableā€Šā€”ā€Šwhether engineering, design or documentation. But I believe something just as interesting...

4 clicks (4 unique) 2 months ago

Of Course Trump Has Surrounded Himself With Idiots This Time Around

Hannah Arendt, The Origins of Totalitarianism: Totalitarianism in power invariably replaces all first-rate talents, regardless of their sympathies, with those crackpots and fools whose lack of intelligence and creativity is...

5 clicks (5 unique) 2 months ago

Show Me Your Faith and I Will Show You My Work - Don't Neglect Your Technical Foundation

Technology professionals often follow a dangerous career path, says Andrew Keen. Keen: We excel technically, get promoted into management, and then distance ourselves from the skills that got us there....

5 clicks (5 unique) 2 months ago

The Frick Collection is back open after a five-year closure for a...

The Frick Collection is back open after a five-year closure for a renovation. šŸ’¬ Join the discussion on kottke.org →

5 clicks (5 unique) 2 months ago

Notification Summary Miscues

Paul Kafasis: Since they were first enabled last year, I have frequently found Apple Intelligence’s notification summaries for emails to be something less than helpful. Here are some I spotted...

6 clicks (6 unique) 2 months ago

This Ultra-Cringe Cybertruck Country Music Video May Cause Your Flesh to Slough Off From Secondhand Embarrassment

The cult surrounding Elon Musk has reached Ludicrous levels. In a new music video, Alessandra Basher — self-professed "stay-at-home mom, who dreams about "being a stand-up comedian one day" —...

5 clicks (5 unique) 2 months ago

Thank you to everyone who ordered a shirt! The preorder window is now closed. Our team is hard at w

Thank you to everyone who ordered a shirt! The preorder window is now closed. Our team is hard at work bringing them to life. We expect to start shipping by...

5 clicks (5 unique) 2 months ago

Russian hackers find ways to snoop on Ukrainian Signal accounts. (Hmm, 18...

Russian hackers find ways to snoop on Ukrainian Signal accounts. (Hmm, 18 people in the Yemen bombing chat, some w/ ties to the Kremlin — what are the odds Russia...

5 clicks (5 unique) 2 months ago

Itender Rawat Caught At It Again (Spam) Under New Fake Name & Website MarketResearchTab(dot)com

The notorious spammer behind MarketResearchTab.com, [Itender Rawat, is at it again. Now operating under the fake name "Sally Andrews," Rawat continues his spam email marketing campaigns. His latest campaign continues...

6 clicks (6 unique) 2 months ago

OPSEC Isn’t Even the Worst Part of ā€˜SignalGate’

Josh Marshal, writing at Talking Points Memo: Especially in the national security domain, many things the government does have to remain secret. Sometimes those things remain secret for years or...

4 clicks (4 unique) 2 months ago

Bijan on the blog again

Bijan Sabet is one of the people in our industry I admire ardently. His work ethic, moral conviction, and understanding of himself have made him a joy. We served together...

5 clicks (5 unique) 2 months ago

The Problem Is Far More Than Just Whether Signal Is ā€˜Secure’

Maggie Miller and Dana Nickel, reporting for Politico: The app’s security is viewed as fairly strong due to its robust privacy features and minimal data collection, as well as default...

5 clicks (5 unique) 2 months ago

McSweeney’s is documenting the ā€œcruelties, collusions, corruptions, and crimesā€ of the 2nd...

McSweeney’s is documenting the ā€œcruelties, collusions, corruptions, and crimesā€ of the 2nd Trump administration. This is a great resource.

4 clicks (4 unique) 2 months ago

Days After the Trump National Security Team’s Signal Leak, the Pentagon Warned That Russian Hackers Are Using Phishing Attacks to Abuse Signal’s ā€˜Linked Devices’ Feature

NPR: Several days after top national security officials accidentally included a reporter in a Signal chat about bombing Houthi sites in Yemen, a Pentagon-wide advisory warned against using the messaging...

6 clicks (6 unique) 2 months ago

Too Many AIs With Too Many Terrible Names: How to Choose Your AI Model

AI labs have flooded us with so many new models that I'm struggling to keep up. The new models are awesome, but their naming is a complete mess. You can't...

4 clicks (4 unique) 2 months ago

Pentagon Issued Warning About Signal Messaging One Week Before Its Head Was Caught Using It

Earlier this week, The Atlantic's editor-in-chief Jeffrey Goldberg revealed in a shocking editorial that he was accidentally added to a group chat on Signal between key national security advisers as...

5 clicks (5 unique) 2 months ago

Active Roles Wins 2025 Cybersecurity Excellence Award For Hybrid Active Directory Protection

One Identity Active Roles named a winner in the 'Hybrid Active Directory Protection' category of the 2025 Cybersecurity Excellence Awards. One Identity's solution helps organizations protect against security breaches, streamline...

4 clicks (4 unique) 2 months ago

IDT Corporation Partners With AccuKnox For Zero Trust Runtime IoT/Edge Security

AccuKnox, Inc. announced that Telecom and FinTech Leader, IDT Corporation has partnered with Accuknox to deploy Zero Trust CNAPP. Gartner’s predictions for the Internet of Things (IoT) security landscape in...

5 clicks (5 unique) 2 months ago

New York Post: ā€˜European Union to Fine Meta Up to $1B or More for Breaching DMA’

Thomas Barrabi, reporting for The New York Post: The European Union is set to slap Mark Zuckerberg’s Meta with a fine that could stretch to $1 billion or more for...

6 clicks (6 unique) 2 months ago

CYREBRO Recognized In Gartner Emerging Tech Report For Detection And Response Startups

CYREBRO has been identified as a key startup in the preemptive cybersecurity category. The report highlights companies with a proactive strategy designed to prevent, disrupt, or deter cyberattacks before they...

5 clicks (5 unique) 2 months ago

Welcome to Postreads

Discover and follow the best content from across the web, all in one place. Create an account to start building your personalized feed today and never miss out on great reads.

Support Postreads

Enjoying the service? Help me keep it running and improve it further by buying me a coffee!

Buy me a coffee

Content Timeline

\