modelcontextprotocol/servers

bookmarks
AI Autonomous Coding Agent for VS Code
JavaScript modules
All modern browsers support module features natively without needing transpilation. It can only be a good thing — browsers can optimize loading of modules, making it more efficient than having to use a library and do all of that extra client-side processing and extra round trips
The first thing you do to get access to module features is export them. This is done using the export statement
For example, the imports key in the import map below defines a "module specifier map" JSON object where the property names can be used as module specifiers, and the corresponding values will be substituted when the browser resolves the module URL.
Script files used by websites often have hashed filenames to simplify caching. The downside of this approach is that if a module changes, any modules that import it using its hashed filename will also need to be updated/regenerated.
Collaboration and privacy
Exa Websets
Critical CSS Generator | Kigo
Clippy Desktop Assistant
babel-preset-php
On The Death of Daydreaming
friends would tell me: “this is happening to me too.” I realized that the global transition to a phone-based life is transforming everyone’s consciousness
How to live an intellectually rich life
Epistemic Anxiety is the feeling of uneasiness, tension, and concern when you want to know the truth. You worry that your knowledge is incomplete and full of errors, and you may believe it.
You either lack the resources, methods or agency to get to the truth
Why does Anubis use Proof-of-Work? | Anubis
Third Party Cookies Must Be Removed
Enshrouded supera i 4 milioni di giocatori, in arrivo tanti nuovi contenuti
How I Created Perfect Wiki and Reached $250K in Annual Revenue Without Investors
Finetune AI using data in Google Sheets
What I've learned about writing AI apps so far | Seldo.com
Spain-Portugal Power Outage: Why Restarting a Grid Is So Hard
LLMs can't stop making up software dependencies and sabotaging everything • The Register
All that's required is to create a malicious software package under a hallucinated package name and then upload the bad package to a package registry or index like PyPI or npm for distribution
Your phone isn’t secretly listening to you, but the truth is more disturbing
Watching o3 guess a photo’s location is surreal, dystopian and wildly entertaining
Novel Universal Bypass for All Major LLMs
One Prompt Can Bypass Every Major LLM’s Safeguards
First Principles of Interaction Design (Revised & Expanded) | askTog