Hacker Newsnew | comments | show | ask | jobs | submit login
1.
Japanese mini Segway “WalkCar” (catchynet.com)
51 points by lisper 1 hour ago | 15 comments
2.
Five Years of Being a Full-Time Indie Game Developer (paradeofrain.com)
54 points by danso 2 hours ago | 10 comments
3.
BEAM languages, Hindley–Milner type systems, and new technologies (medium.com)
11 points by pyotrgalois 58 minutes ago | discuss
4.
The Disappearance of the World’s Greatest Free Diver (newyorker.com)
41 points by Thevet 3 hours ago | 24 comments
5.
Credit cards used on cvsphoto.com may have been compromised (cvsphoto.com)
52 points by heavymark 4 hours ago | 25 comments
6.
The people who hold the keys to worldwide Internet security (theguardian.com)
20 points by dsr12 2 hours ago | 4 comments
7.
The dwarves of Auschwitz (2013) (theguardian.com)
20 points by samsolomon 2 hours ago | discuss
8.
Type-checked matrix operations in Rust (jadpole.github.io)
31 points by jcla1 4 hours ago | 4 comments
9.
The Memory Sinkhole [pdf] (blackhat.com)
18 points by MrBuddyCasino 3 hours ago | 6 comments
10.
Carphone Warehouse in customer data breach (bbc.co.uk)
18 points by k-mcgrady 3 hours ago | 3 comments
11.
Essentially contested concept (wikipedia.org)
16 points by networked 3 hours ago | discuss
12.
You Can Prove a Negative [pdf] (bloomu.edu)
4 points by miralabs 1 hour ago | 1 comment
13.
User with Muslim name blocked from downloading Sophos AV for Mac (theregister.co.uk)
22 points by teh_klev 1 hour ago | 2 comments
14.
The website is unknown – How DNS works (howdns.works)
115 points by dbrgn 4 hours ago | 18 comments
15.
Emacs/Perforce integration: a retrospective (garethrees.org)
13 points by AndrewDucker 6 hours ago | 4 comments
16.
IBM Adds Medical Images to Watson, Buying Merge Healthcare for $1B (bits.blogs.nytimes.com)
76 points by denzil_correa 9 hours ago | 28 comments
17.
Python metaclasses (ivansmirnov.io)
23 points by aldanor 4 hours ago | 11 comments
18.
Ask HN: Best resources on webapp security?
85 points by zipfle 5 hours ago | 34 comments
19.
In Dependencies We Trust: How vulnerable are dependencies in software modules? (researchgate.net)
11 points by ximeng 3 hours ago | 2 comments
20. True Link (YC S13) Hiring Customer Advocates
1 hour ago
21.
At Silicon Valley Bank, risky tech startups are lucrative business (latimes.com)
3 points by shahryc 56 minutes ago | 1 comment
22.
Vancouver’s high-tech hurdle: Attracting top-level talent (theglobeandmail.com)
5 points by curiousjorge 2 hours ago | 8 comments
23.
Ask HN: Books with a high signal to noise ratio?
118 points by thewarrior 5 hours ago | 104 comments
24.
Dense bitpacking (londonstartuptech.com)
21 points by hywel 9 hours ago | 18 comments
25.
Rush to Put Death Records Online Lets Anyone be 'Killed' (securityweek.com)
31 points by hackinsider 2 hours ago | 12 comments
26.
Ask HN: Liability due to lack of SSL
20 points by stevenhubertron 3 hours ago | 16 comments
27.
A fast gesture recognizer based on the PennyPincher algorithm, written in Swift (fe9lix.github.io)
4 points by fe9-lix 2 hours ago | discuss
28.
Sidecar Puts Passengers Aside, Pivots to a Mostly-Deliveries Company (forbes.com)
39 points by prostoalex 10 hours ago | 13 comments
29.
How many lives does a doctor save? (80000hours.org)
47 points by robertwiblin 16 hours ago | 35 comments
30.
Verizon will drop phone contracts, end discounted phones (yahoo.com)
27 points by jrs235 3 hours ago | 36 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: