Content Paint

The Stack

Interviews, insight, intelligence, and exclusive events for digital leaders.

 |  linux  | Apr 28, 2026
/
NixOS: the lesser-known atomic OS France tapped for sovereign migration
 |  AI  | Apr 28, 2026
/
Streaming architecture and speculative decoding: How companies are unlocking cheaper AI
 |  startups  | Apr 27, 2026
/
STACKUP: The Stack's weekly tech startups and funding wrap
GitHub  | Apr 27, 2026
/
GitHub bug messed up  customer code; COO plays down incident
Cisco  | Apr 25, 2026
/
FIRESTARTER backdoor used for persistence on Cisco boxes in "widespread campaign
 |  Security  | Apr 24, 2026
/
The NCSC is worried about HDMI-based attacks, should you be?

All the latest

All the latest

4216 Posts
NixOS: the lesser-known atomic OS France tapped for sovereign migration

France is betting on NixOS's declarative, reproducible model for secure, large-scale deployments—despite governance hiccups and a steep learning curve.

Streaming architecture and speculative decoding: How companies are unlocking cheaper AI

"Commodity or previous-gen hardware still has a long life in AI if the software layer is smart enough.”

OpenAI’s hottest models are coming to Bedrock

Get ready to lean hard into the EstimatedTPMQuotaUsage metric.

New Chinese open models challenge closed Western top tier

DeepSeek V4 and Qwen3.6-27B, both out last week, put pressure on Western models – especially for pricing.

STACKUP: The Stack's weekly tech startups and funding wrap

This week's rounds and milestones.

“The CPU is reinserting itself”, will reach parity with GPUs for AI workloads: Tan

Elon Musk wants Intel's 14a for his planned "Terafab"

France’s shift from US technology starts with 250 "DINUM" machines and NixOS

Sécurix builds on a NixOS configuration layer designed to meet the requirements of ANSSI.

GitHub bug messed up  customer code; COO plays down incident

The company didn’t even notice it happening until customers howled - COO describes it as an "edge case"

FIRESTARTER backdoor used for persistence on Cisco boxes in "widespread campaign

The only real way to spot the malware is memory analysis. Organisations can get a disk image by opening a Cisco Technical Assistance Center (TAC) case. Good luck, y'all.

Browse by Tags

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.