Feed aggregator
Ask HN: How to acquire professional experience in the age of AI as junior dev?
For quite a while now I read all these disheartening articles about newcomers to programming field feeling completely incompetent for being unable to acquire professional experience.
If it helps to make things a bit more comforting for them, I feel the same and I am a person with some form of experience.
How can anyone acquire professional experience nowadays, even if it means to start from near zero?
Any suggestions or thoughts on this topic?
Comments URL: https://news.ycombinator.com/item?id=43693601
Points: 1
# Comments: 0
Show HN: Rocal.dev – Build Web Apps That Work Offline First
Hey HN, I’m building Rocal — a Rust + WASM web framework that helps you build offline-first apps without needing a server at all. Think of it like the backend and frontend merged into one local experience—everything runs in the browser.
Here’s the post that kicked this off: “Ditch the Server: Build Offline-Ready Apps with Local-First Architecture” (https://dev.to/picolt/ditch-the-server-build-offline-ready-a...)
A bit of backstory: I was building a POS (point-of-sale) system for small businesses where internet connection is unreliable. I realized that even basic actions—like adding items to a cart or saving a transaction—depended too much on network requests. That’s when I decided to flip the model and build an architecture that’s local-first by default.
Here’s how it works:
WASM + SQLite in the Browser – The app is compiled to WebAssembly and runs completely client-side, including a local embedded SQLite database. No server round trips needed to store or query data.
No External API Needed – The "backend" logic is written in Rust and compiled to run in the browser. You can think of it as a monolith that's shipped to the client.
Works Offline by Default – Everything from data storage to routing and rendering happens locally. Even if the user loses connection mid-session, the app doesn’t break.
Optional Syncing – If you want cloud sync later (for backup, multi-device, or analytics), that can be layered on top after your core app works offline.
There’s no "server" in the traditional sense. You write your UI, logic, and data models in Rust. The Rocal framework handles rendering, routing, persistence, and local execution via WASM.
I know it sounds wild, but it’s working well for POS systems, form-heavy apps, and other use cases where latency or connectivity is a problem. Think kiosk apps, field tools, or apps meant for remote areas.
Here’s a quick demo and explanation of the architecture (more demos coming soon): https://demo1.rocal.app
Rocal is fully open-source and still in early stages. I’m actively building the CLI, versioning system, and dev workflow to make it easier to ship apps like this. Long-term, I want to make it as simple to build and deploy local-first web apps as it is to spin up a typical full-stack app. GitHub: https://github.com/rocal-dev/rocal
If you’re curious about building apps that feel instant, resilient, and fully private, I’d love your thoughts and feedback.
Thanks!
Comments URL: https://news.ycombinator.com/item?id=43693597
Points: 1
# Comments: 0
Doge Is Far Short of Its Goal, and Still Overstating Its Progress
Article URL: https://www.nytimes.com/2025/04/13/us/politics/doge-contracts-savings.html
Comments URL: https://news.ycombinator.com/item?id=43693584
Points: 26
# Comments: 3
Hertz data breach caused by CL0P ransomware attack on vendor
The Hertz Corporation, on behalf of Hertz, Dollar, and Thrifty brands, is sending breach notifications to customers who may have had their name, contact information, driver’s license, and—in rare cases—Social Security Number exposed in a data breach.
The car rental giant’s data was stolen in a ransomware attack leveraging a vulnerability in Cleo file sharing products.
In 2023, the CL0P ransomware gang broke the scalability barrier and shook the security world with a series of short, automated campaigns, hitting hundreds of unsuspecting targets simultaneously with attacks based on zero-day exploits in file sharing software like MOVEit Transfer and GoAnywhere MFT.
In 2024, CL0P repeated this method using a zero-day exploit against Cleo, a business-to-business (B2B) tech platform provider that specializes in managed file transfer (MFT) solutions, like Cleo Harmony, VLTrader, and LexiCom.
Hertz acknowledged that it was one of the victims:
“On February 10, 2025, we confirmed that Hertz data was acquired by an unauthorized third party that we understand exploited zeroday vulnerabilities within Cleo’s platform in October 2024 and December 2024.”
We were already aware of the fact, since CL0P posted about it on their leak site.
A screenshot of some of CL0P’s list of victims (other victims’ names obscured)This leak site is also where the stolen data is available for download. Malwarebytes Labs was unable to figure out how many people were affected, but the number of available archives for download is in the tenfolds.
A small portion of the downloads listAfter a full data analysis, Hertz is sending notifications to affected customers. The type of stolen data varies per customer, but could include:
- Name
- Contact information
- Driver’s license
- Social Security Number (in rare cases according to Hertz)
“A very small number of individuals may have had their Social Security or other government identification numbers, passport information, Medicare or Medicaid ID (associated with workers’ compensation claims), or injury-related information associated with vehicle accident claims impacted by the event.”
While Hertz says it’s not aware of any misuse of stolen personal information for fraudulent purposes, it offers affected customers two years of identity monitoring services by Kroll for free.
Protecting yourself after a data breachThere are some actions you can take if you are, or suspect you may have been, the victim of a data breach.
- Check the vendor’s advice. Every breach is different, so check with the vendor to find out what’s happened, and follow any specific advice they offer.
- Change your password. You can make a stolen password useless to thieves by changing it. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you.
- Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of two-factor authentication (2FA) can be phished just as easily as a password. 2FA that relies on a FIDO2 device can’t be phished.
- Watch out for fake vendors. The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify the identity of anyone who contacts you using a different communication channel.
- Take your time. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.
- Consider not storing your card details. It’s definitely more convenient to get sites to remember your card details for you, but we highly recommend not storing that information on websites.
- Set up identity monitoring. Identity monitoring alerts you if your personal information is found being traded illegally online, and helps you recover after.
Check your digital footprint
Malwarebytes has a free tool for you to check how much of your personal data has been exposed online. Submit your email address (it’s best to give the one you most frequently use) to our free Digital Footprint scan and we’ll give you a report and recommendations.
ICE Agents Realize They Arrested Wrong Teen, Say 'Take Him Anyway'
Article URL: https://www.newsweek.com/merwil-gutierrez-ice-wrong-teen-el-salvador-2059783
Comments URL: https://news.ycombinator.com/item?id=43693531
Points: 65
# Comments: 22
AI Generated Evaluation of an RFP Built with Lovable/Gumloop/Cursor/Vercel
Article URL: https://gonogo.trampoline.ai
Comments URL: https://news.ycombinator.com/item?id=43693501
Points: 1
# Comments: 0
Postiz Introduces MCPs
Article URL: https://github.com/gitroomhq/postiz-app
Comments URL: https://news.ycombinator.com/item?id=43693497
Points: 1
# Comments: 1
Fixing Shotgun Surgery in Ruby
Article URL: https://thedailydeveloper.substack.com/p/fixing-shotgun-surgery-in-ruby
Comments URL: https://news.ycombinator.com/item?id=43693465
Points: 2
# Comments: 0
Show HN: Buzzled – a three axis hex logic puzzle
I made this new daily number puzzle with four modes for beginners, casual and challenging play. I'd love to hear your feedback
Colour all the hexes yellow or black to solve the puzzle
Each row has a pin showing a target sum and colour (yellow or black). Click the hexes to change their colour so the sum of the hexes of one colour match the target sum and colour. (Right click cycles the colours in the opposite order)
When a row is solved its pin gets a green border. Pins with a green border can be clicked to fill all white hexes in that row with the opposite colour.
Comments URL: https://news.ycombinator.com/item?id=43693453
Points: 2
# Comments: 0
Observable Canvases
Article URL: https://observablehq.com/blog/introducing-canvases-early-access
Comments URL: https://news.ycombinator.com/item?id=43693450
Points: 1
# Comments: 0
Creating Histograms with Postgres
Article URL: https://www.crunchydata.com/blog/histograms-with-postgres
Comments URL: https://news.ycombinator.com/item?id=43693446
Points: 1
# Comments: 0
Campfire v4: cozy, minimal web framework for building interactive web apps
Article URL: https://campfire.js.org
Comments URL: https://news.ycombinator.com/item?id=43693434
Points: 2
# Comments: 1
Kidney Dialysis Services Provider DaVita Hit by Ransomware
DaVita has not named the ransomware group behind the incident or share details on the attacker’s ransom demands.
The post Kidney Dialysis Services Provider DaVita Hit by Ransomware appeared first on SecurityWeek.
Conduent Says Names, Social Security Numbers Stolen in Cyberattack
The business services provider confirms personal information such as names and Social Security numbers was stolen in a January cyberattack.
The post Conduent Says Names, Social Security Numbers Stolen in Cyberattack appeared first on SecurityWeek.
2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches
In fresh filings, Landmark Admin and Young Consulting say data breaches back in 2024 impacted more people than initially estimated.
The post 2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches appeared first on SecurityWeek.
Getting Started with W65C832
Article URL: https://joedavisson.com/software/w65c832/w65c832.html
Comments URL: https://news.ycombinator.com/item?id=43692811
Points: 1
# Comments: 0
An Obituary for Millennial Culture
Article URL: https://www.vice.com/en/article/an-obituary-for-millennial-culture/
Comments URL: https://news.ycombinator.com/item?id=43692799
Points: 1
# Comments: 0