Weekend #Plankton Factoid 🦠🦐
Plankton is fundamental to the functioning of aquatic #ecosystems. An example was seen in the 2013 deaths of #Florida bottlenose dolphins. Dense harmful phytoplankton
Der #Säuregehalt der #Ozeane hat laut neuer Analyse bereits die sichere planetare Grenze überschritten.
Besonders in 200 Meter Tiefe sind 60 Prozent des Wassers zu stark #versauert. Das…
Trump's tax and immigration bill could add $3.3 trillion to national debt, CBO finds (Washington Post)
https://www.washingtonpost.com/politics/2025/06/17/trump-presidency-news/?pwapi_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJyZWFzb24iOiJnaWZ0IiwibmJmIjoxNzUwMTMyODAwLCJpc3MiOiJzdWJzY3JpcHRpb25zIiwiZXhwIjoxNzUxNTE1MTk5LCJpYXQiOjE3NTAxMzI4MDAsImp0aSI6ImQ3YzdkNDQ0LWJjODAtNGFmOC05MzRlLTA5OGMwOTJkZDhlNyIsInVybCI6Imh0dHBzOi8vd3d3Lndhc2hpbmd0b25wb3N0LmNvbS9wb2xpdGljcy8yMDI1LzA2LzE3L3RydW1wLXByZXNpZGVuY3ktbmV3cy8ifQ.ngukXdygnHYUZI__OXYK8qr7FNrJJLHeWY1FphbPCuY&itid=gfta
http://www.memeorandum.com/250617/p123#a250617p123
Monimuotoisuus on avain ekosysteemien vakauteen #luonto
LeanExplore: A search engine for Lean 4 declarations
Justin Asher (Independent Researcher)
https://arxiv.org/abs/2506.11085 https://a…
“CVE naming and assignment to software packages and versions are the foundation upon which the software vulnerability ecosystem is based. Without it, we can’t track newly discovered vulnerabilities. We can’t score their severity or predict their exploitation. And we certainly wouldn’t be able to make the best decisions regarding patching them.”
Open Source, Open Threats? Investigating Security Challenges in Open-Source Software
Seyed Ali Akhavani, Behzad Ousat, Amin Kharraz
https://arxiv.org/abs/2506.12995
Trump officials reverse guidance exempting farms, hotels from immigration raids (Washington Post)
https://www.washingtonpost.com/immigration/2025/06/16/trump-farms-hotels-immigration-raids/?pwapi_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJyZWFzb24iOiJnaWZ0IiwibmJmIjoxNzUwMDQ2NDAwLCJpc3MiOiJzdWJzY3JpcHRpb25zIiwiZXhwIjoxNzUxNDI4Nzk5LCJpYXQiOjE3NTAwNDY0MDAsImp0aSI6IjYwNmMxMGFkLTVlYjQtNDVjNi1hYzcyLWNmZjkzMDdiYjU0NCIsInVybCI6Imh0dHBzOi8vd3d3Lndhc2hpbmd0b25wb3N0LmNvbS9pbW1pZ3JhdGlvbi8yMDI1LzA2LzE2L3RydW1wLWZhcm1zLWhvdGVscy1pbW1pZ3JhdGlvbi1yYWlkcy8ifQ.Ud1j0dRlcVjt3OzkLR8XjCdxD1Z9lIPe3jjA1qpoGF4&itid=gfta
http://www.memeorandum.com/250616/p160#a250616p160
Model Context Protocol (MCP) at First Glance: Studying the Security and Maintainability of MCP Servers
Mohammed Mehedi Hasan, Hao Li, Emad Fallahzadeh, Bram Adams, Ahmed E. Hassan
https://arxiv.org/abs/2506.13538
The Foundation Cracks: A Comprehensive Study on Bugs and Testing Practices in LLM Libraries
Weipeng Jiang, Xiaoyu Zhang, Xiaofei Xie, Jiongchi Yu, Yuhan Zhi, Shiqing Ma, Chao Shen
https://arxiv.org/abs/2506.12320