Hacker Newsnew | comments | ask | jobs | submitlogin
1.
Rappers, Sorted by Size of Vocabulary (amazonaws.com)
238 points by sinned 5 hours ago | 110 comments
2.
Zombies once destroyed Japan's economy, now they're infecting China's (qz.com)
58 points by throwaway2048 3 hours ago | 15 comments
3.
When does a physical system compute? (arxiv.org)
42 points by yiransheng 4 hours ago | 4 comments
4.
Chinese Number Websites (newrepublic.com)
101 points by bpierre 7 hours ago | 67 comments
5.
Chrome's experiment of hiding the URL is great for security (jakearchibald.com)
116 points by jaffathecake 7 hours ago | 145 comments
6.
What Writing and Selling Software Was Like in the 80s (thecodist.com)
100 points by nih 8 hours ago | 31 comments
7.
Show HN: Compare book prices across Amazon, Wordery, and the Book Depository (piranhas.co)
13 points by k33l0r 2 hours ago | 16 comments
8.
Computer system automatically solves word problems (mit.edu)
19 points by ColinWright 3 hours ago | 4 comments
9.
MongoMem: Memory usage by collection in MongoDB (wish.com)
9 points by rgarcia 1 hour ago | 1 comment
10.
Chromebooks on Fire (recode.net)
5 points by msh 50 minutes ago | discuss
11.
U-2 spy plane caused widespread shutdown of U.S. flights (reuters.com)
51 points by happyscrappy 6 hours ago | 30 comments
12.
Coding the Movies – Don’t Fake It (goconspire.com)
72 points by pauljm 2 hours ago | 28 comments
13.
Hot or Not: Revealing Hidden Services by their Clock Skew [pdf] [scribd] (cam.ac.uk)
21 points by lelf 4 hours ago | discuss
14.
The Valuation Trap (avc.com)
54 points by asanwal 8 hours ago | 21 comments
15.
Osxc – Simple configuration tool for OS X (osxc.github.io)
55 points by robinricard 7 hours ago | 26 comments
16.
Revealed preferences aren't always accurate (lesswrong.com)
17 points by adamzerner 4 hours ago | 2 comments
17.
One Scientist’s Bid to Build Cancer-Killing Nanorobots (recode.net)
17 points by Libertatea 4 hours ago | 3 comments
18.
Chrome's experiment of hiding the URL is awful (craig.is)
49 points by craigc 2 hours ago | 32 comments
19.
Anatomy of an exploit: CVE 2014-1776 (snort.org)
15 points by lelf 4 hours ago | discuss
20.
The Data Journalism Handbook (datajournalismhandbook.org)
13 points by rkda 4 hours ago | 1 comment
21.
Running Secure Server Software on Insecure Hardware Without Parachute (slideshare.net)
11 points by moonboots 3 hours ago | 3 comments
22.
Compilers Love Messing With Benchmarks (brendangregg.com)
14 points by helper 4 hours ago | 3 comments
23.
GitHub Language Trends (redmonk.com)
93 points by spatten 15 hours ago | 54 comments
24.
When Hitting ‘Find My iPhone’ Takes You to a Thief’s Doorstep (nytimes.com)
34 points by kanamekun 9 hours ago | 61 comments
25.
Ask HN: How Can I Find a Mentor?
68 points by kremlin 8 hours ago | 37 comments
26.
A C error handling style that plays nice with C++ exceptions (sduto.it)
67 points by lettergram 15 hours ago | 24 comments
27.
Checkdesk: An Open Verification Toolkit for Journalists (checkdesk.org)
7 points by rkda 4 hours ago | discuss
28.
Nimrod for C programmers (github.com)
59 points by stesch 11 hours ago | 53 comments
29.
SSH agent notifications for OS X (devinteske.com)
73 points by zobzu 18 hours ago | 19 comments
30.
Working on The Witness: The Nebraska Problem (mollyrocket.com)
95 points by vilhelm_s 22 hours ago | 17 comments
More

Lists | RSS | Bookmarklet | Guidelines | FAQ | DMCA | News News | Feature Requests | Bugs | Y Combinator | Apply | Library

Search: