Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
Japanese mini Segway “WalkCar”
(catchynet.com)
51 points
by
lisper
1 hour ago
|
15 comments
2.
Five Years of Being a Full-Time Indie Game Developer
(paradeofrain.com)
54 points
by
danso
2 hours ago
|
10 comments
3.
BEAM languages, Hindley–Milner type systems, and new technologies
(medium.com)
11 points
by
pyotrgalois
58 minutes ago
|
discuss
4.
The Disappearance of the World’s Greatest Free Diver
(newyorker.com)
41 points
by
Thevet
3 hours ago
|
24 comments
5.
Credit cards used on cvsphoto.com may have been compromised
(cvsphoto.com)
52 points
by
heavymark
4 hours ago
|
25 comments
6.
The people who hold the keys to worldwide Internet security
(theguardian.com)
20 points
by
dsr12
2 hours ago
|
4 comments
7.
The dwarves of Auschwitz (2013)
(theguardian.com)
20 points
by
samsolomon
2 hours ago
|
discuss
8.
Type-checked matrix operations in Rust
(jadpole.github.io)
31 points
by
jcla1
4 hours ago
|
4 comments
9.
The Memory Sinkhole [pdf]
(blackhat.com)
18 points
by
MrBuddyCasino
3 hours ago
|
6 comments
10.
Carphone Warehouse in customer data breach
(bbc.co.uk)
18 points
by
k-mcgrady
3 hours ago
|
3 comments
11.
Essentially contested concept
(wikipedia.org)
16 points
by
networked
3 hours ago
|
discuss
12.
You Can Prove a Negative [pdf]
(bloomu.edu)
4 points
by
miralabs
1 hour ago
|
1 comment
13.
User with Muslim name blocked from downloading Sophos AV for Mac
(theregister.co.uk)
22 points
by
teh_klev
1 hour ago
|
2 comments
14.
The website is unknown – How DNS works
(howdns.works)
115 points
by
dbrgn
4 hours ago
|
18 comments
15.
Emacs/Perforce integration: a retrospective
(garethrees.org)
13 points
by
AndrewDucker
6 hours ago
|
4 comments
16.
IBM Adds Medical Images to Watson, Buying Merge Healthcare for $1B
(bits.blogs.nytimes.com)
76 points
by
denzil_correa
9 hours ago
|
28 comments
17.
Python metaclasses
(ivansmirnov.io)
23 points
by
aldanor
4 hours ago
|
11 comments
18.
Ask HN: Best resources on webapp security?
85 points
by
zipfle
5 hours ago
|
34 comments
19.
In Dependencies We Trust: How vulnerable are dependencies in software modules?
(researchgate.net)
11 points
by
ximeng
3 hours ago
|
2 comments
20.
True Link (YC S13) Hiring Customer Advocates
1 hour ago
21.
At Silicon Valley Bank, risky tech startups are lucrative business
(latimes.com)
3 points
by
shahryc
56 minutes ago
|
1 comment
22.
Vancouver’s high-tech hurdle: Attracting top-level talent
(theglobeandmail.com)
5 points
by
curiousjorge
2 hours ago
|
8 comments
23.
Ask HN: Books with a high signal to noise ratio?
118 points
by
thewarrior
5 hours ago
|
104 comments
24.
Dense bitpacking
(londonstartuptech.com)
21 points
by
hywel
9 hours ago
|
18 comments
25.
Rush to Put Death Records Online Lets Anyone be 'Killed'
(securityweek.com)
31 points
by
hackinsider
2 hours ago
|
12 comments
26.
Ask HN: Liability due to lack of SSL
20 points
by
stevenhubertron
3 hours ago
|
16 comments
27.
A fast gesture recognizer based on the PennyPincher algorithm, written in Swift
(fe9lix.github.io)
4 points
by
fe9-lix
2 hours ago
|
discuss
28.
Sidecar Puts Passengers Aside, Pivots to a Mostly-Deliveries Company
(forbes.com)
39 points
by
prostoalex
10 hours ago
|
13 comments
29.
How many lives does a doctor save?
(80000hours.org)
47 points
by
robertwiblin
16 hours ago
|
35 comments
30.
Verizon will drop phone contracts, end discounted phones
(yahoo.com)
27 points
by
jrs235
3 hours ago
|
36 comments
More
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: