Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
W^X policy violation affects Windows drivers compiled in VS 2013 and previous
(codeinsecurity.wordpress.com)
46 points
by
mmastrac
1 hour ago
|
5 comments
2.
Call Me Maybe: MariaDB Galera Cluster
(aphyr.com)
194 points
by
akerl_
5 hours ago
|
59 comments
3.
CS Unplugged: Computer Science Without a Computer
(csunplugged.org)
251 points
by
avinassh
7 hours ago
|
58 comments
4.
Procedural Dungeon Generation Algorithm
(gamasutra.com)
108 points
by
ingve
6 hours ago
|
25 comments
5.
No One to Rescue Me from My Drinking
(nytimes.com)
8 points
by
kareemm
44 minutes ago
|
2 comments
6.
The Weight
(theplayerstribune.com)
38 points
by
pmcpinto
4 hours ago
|
2 comments
7.
Friends at Work? Not So Much
(nytimes.com)
28 points
by
prostoalex
7 hours ago
|
1 comment
8.
St. Petersburg paradox
(wikipedia.org)
61 points
by
gmac
10 hours ago
|
40 comments
9.
How Secure Channels Attempted to Intimidate a Critic and Failed Spectacularly
(popehat.com)
146 points
by
tptacek
7 hours ago
|
18 comments
10.
Ada Lovelace: Enchantress of abstraction
(nature.com)
26 points
by
mkempe
4 hours ago
|
11 comments
11.
The Alternate Universe of Soviet Arcade Games
(atlasobscura.com)
44 points
by
lermontov
7 hours ago
|
16 comments
12.
Under the Hood of the Amazon EC2 Container Service
(allthingsdistributed.com)
49 points
by
signaler
6 hours ago
|
15 comments
13.
Lost C64 Games: Daffy Duck – 1992 Hi-Tec
(gamesthatwerent.com)
131 points
by
ingve
8 hours ago
|
35 comments
14.
Rosalind, a platform for learning bioinformatics and programming
(rosalind.info)
20 points
by
aarestad
5 hours ago
|
2 comments
15.
Hawaii First to Harness Deep-Ocean Temperatures for Power
(scientificamerican.com)
11 points
by
deegles
1 hour ago
|
4 comments
16.
Linguistic Harbingers of Betrayal
(vene.ro)
57 points
by
gcv
10 hours ago
|
12 comments
17.
An Analysis of China’s “Great Cannon”
(usenix.org)
47 points
by
sasvari
9 hours ago
|
discuss
18.
Show HN: Libsoundio 1.0.0 – cross-platform audio input and output
(libsound.io)
73 points
by
AndyKelley
6 hours ago
|
26 comments
19.
Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms
(samvartaka.github.io)
62 points
by
mukyu
8 hours ago
|
4 comments
20.
Learn by Implementation: K-Nearest Neighbor
(depiesml.wordpress.com)
28 points
by
vonnik
6 hours ago
|
3 comments
21.
OOSMOS – The Object-Oriented State Machine Operating System
(oosmos.com)
29 points
by
zzglenm
5 hours ago
|
6 comments
22.
Picoc: A very small C interpreter for scripting
(github.com)
62 points
by
alecco
7 hours ago
|
17 comments
23.
Monads in Scheme
(okmij.org)
76 points
by
amirouche
9 hours ago
|
14 comments
24.
Generate command-line completions using a simple DSL
(github.com)
4 points
by
dmmalam
3 hours ago
|
discuss
25.
How a Boeing Sales Flop Became the World's Hottest Secondhand Jetliner
(bloomberg.com)
72 points
by
jwegan
8 hours ago
|
50 comments
26.
The Witches of Salem
(newyorker.com)
12 points
by
pmcpinto
4 hours ago
|
discuss
27.
NASA's 1975 Graphics Standards Manual
(slate.com)
27 points
by
ForHackernews
8 hours ago
|
8 comments
28.
Close.io, the inside sales platform, is hiring in all areas
(close.io)
2 hours ago
29.
DPDK: Data Plane Development Kit
(dpdk.org)
30 points
by
pjf
10 hours ago
|
discuss
30.
Zippers and Type Magic
(theoremsfor.me)
39 points
by
signa11
11 hours ago
|
6 comments
More
Applications are open for YC Winter 2016
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: