Hacker Newsnew | comments | show | ask | jobs | submit login
1.
W^X policy violation affects Windows drivers compiled in VS 2013 and previous (codeinsecurity.wordpress.com)
46 points by mmastrac 1 hour ago | 5 comments
2.
Call Me Maybe: MariaDB Galera Cluster (aphyr.com)
194 points by akerl_ 5 hours ago | 59 comments
3.
CS Unplugged: Computer Science Without a Computer (csunplugged.org)
251 points by avinassh 7 hours ago | 58 comments
4.
Procedural Dungeon Generation Algorithm (gamasutra.com)
108 points by ingve 6 hours ago | 25 comments
5.
No One to Rescue Me from My Drinking (nytimes.com)
8 points by kareemm 44 minutes ago | 2 comments
6.
The Weight (theplayerstribune.com)
38 points by pmcpinto 4 hours ago | 2 comments
7.
Friends at Work? Not So Much (nytimes.com)
28 points by prostoalex 7 hours ago | 1 comment
8.
St. Petersburg paradox (wikipedia.org)
61 points by gmac 10 hours ago | 40 comments
9.
How Secure Channels Attempted to Intimidate a Critic and Failed Spectacularly (popehat.com)
146 points by tptacek 7 hours ago | 18 comments
10.
Ada Lovelace: Enchantress of abstraction (nature.com)
26 points by mkempe 4 hours ago | 11 comments
11.
The Alternate Universe of Soviet Arcade Games (atlasobscura.com)
44 points by lermontov 7 hours ago | 16 comments
12.
Under the Hood of the Amazon EC2 Container Service (allthingsdistributed.com)
49 points by signaler 6 hours ago | 15 comments
13.
Lost C64 Games: Daffy Duck – 1992 Hi-Tec (gamesthatwerent.com)
131 points by ingve 8 hours ago | 35 comments
14.
Rosalind, a platform for learning bioinformatics and programming (rosalind.info)
20 points by aarestad 5 hours ago | 2 comments
15.
Hawaii First to Harness Deep-Ocean Temperatures for Power (scientificamerican.com)
11 points by deegles 1 hour ago | 4 comments
16.
Linguistic Harbingers of Betrayal (vene.ro)
57 points by gcv 10 hours ago | 12 comments
17.
An Analysis of China’s “Great Cannon” (usenix.org)
47 points by sasvari 9 hours ago | discuss
18.
Show HN: Libsoundio 1.0.0 – cross-platform audio input and output (libsound.io)
73 points by AndyKelley 6 hours ago | 26 comments
19.
Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms (samvartaka.github.io)
62 points by mukyu 8 hours ago | 4 comments
20.
Learn by Implementation: K-Nearest Neighbor (depiesml.wordpress.com)
28 points by vonnik 6 hours ago | 3 comments
21.
OOSMOS – The Object-Oriented State Machine Operating System (oosmos.com)
29 points by zzglenm 5 hours ago | 6 comments
22.
Picoc: A very small C interpreter for scripting (github.com)
62 points by alecco 7 hours ago | 17 comments
23.
Monads in Scheme (okmij.org)
76 points by amirouche 9 hours ago | 14 comments
24.
Generate command-line completions using a simple DSL (github.com)
4 points by dmmalam 3 hours ago | discuss
25.
How a Boeing Sales Flop Became the World's Hottest Secondhand Jetliner (bloomberg.com)
72 points by jwegan 8 hours ago | 50 comments
26.
The Witches of Salem (newyorker.com)
12 points by pmcpinto 4 hours ago | discuss
27.
NASA's 1975 Graphics Standards Manual (slate.com)
27 points by ForHackernews 8 hours ago | 8 comments
28. Close.io, the inside sales platform, is hiring in all areas (close.io)
2 hours ago
29.
DPDK: Data Plane Development Kit (dpdk.org)
30 points by pjf 10 hours ago | discuss
30.
Zippers and Type Magic (theoremsfor.me)
39 points by signa11 11 hours ago | 6 comments
More

Applications are open for YC Winter 2016

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: