Hacker Newsnew | comments | show | ask | jobs | submit login
1.
Dead Code Should Be Buried – Why I Didn't Contribute to NLTK (spacy.io)
40 points by Smerity 1 hour ago | 6 comments
2.
New tool for police: vehicle system forensics (berla.co)
20 points by tlack 1 hour ago | 5 comments
3.
W^X policy violation affects Windows drivers compiled in VS 2013 and previous (codeinsecurity.wordpress.com)
78 points by mmastrac 5 hours ago | 21 comments
4.
Call Me Maybe: MariaDB Galera Cluster (aphyr.com)
220 points by akerl_ 9 hours ago | 76 comments
5.
CS Unplugged: Computer Science Without a Computer (csunplugged.org)
290 points by avinassh 11 hours ago | 77 comments
6.
Procedural Dungeon Generation Algorithm (gamasutra.com)
131 points by ingve 10 hours ago | 28 comments
7. The Muse (YC W12) Is Hiring an Experienced Office Manager in NYC (themuse.com)
11 minutes ago
8.
The Weight (theplayerstribune.com)
67 points by pmcpinto 8 hours ago | 3 comments
9.
St. Petersburg paradox (wikipedia.org)
80 points by gmac 14 hours ago | 53 comments
10.
How Secure Channels Attempted to Intimidate a Critic and Failed Spectacularly (popehat.com)
167 points by tptacek 11 hours ago | 20 comments
11.
Lost C64 Games: Daffy Duck – 1992 Hi-Tec (gamesthatwerent.com)
141 points by ingve 12 hours ago | 37 comments
12.
The Alternate Universe of Soviet Arcade Games (atlasobscura.com)
61 points by lermontov 11 hours ago | 20 comments
13.
Generate command-line completions using a simple DSL (github.com)
19 points by dmmalam 7 hours ago | discuss
14.
Anderson.vim: Dark vim colorscheme based on colors from Wes Anderson films (github.com)
16 points by tambourine_man 3 hours ago | 6 comments
15.
Why drivers in China intentionally kill the pedestrians they hit (slate.com)
155 points by fhinson 3 hours ago | 145 comments
16.
Ada Lovelace: Enchantress of abstraction (nature.com)
39 points by mkempe 8 hours ago | 18 comments
17.
Under the Hood of the Amazon EC2 Container Service (allthingsdistributed.com)
57 points by signaler 10 hours ago | 18 comments
18.
Linguistic Harbingers of Betrayal (vene.ro)
70 points by gcv 14 hours ago | 12 comments
19.
An Analysis of China’s “Great Cannon” (usenix.org)
63 points by sasvari 13 hours ago | 1 comment
20.
No One to Rescue Me from My Drinking (nytimes.com)
59 points by kareemm 4 hours ago | 52 comments
21.
Rosalind, a platform for learning bioinformatics and programming (rosalind.info)
29 points by aarestad 9 hours ago | 3 comments
22.
Show HN: Libsoundio 1.0.0 – cross-platform audio input and output (libsound.io)
85 points by AndyKelley 10 hours ago | 27 comments
23.
Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms (samvartaka.github.io)
71 points by mukyu 12 hours ago | 4 comments
24.
Learn by Implementation: K-Nearest Neighbor (depiesml.wordpress.com)
37 points by vonnik 10 hours ago | 3 comments
25.
Monads in Scheme (okmij.org)
84 points by amirouche 13 hours ago | 15 comments
26.
Picoc: A very small C interpreter for scripting (github.com)
69 points by alecco 11 hours ago | 20 comments
27.
OOSMOS – The Object-Oriented State Machine Operating System (oosmos.com)
33 points by zzglenm 9 hours ago | 7 comments
28.
Hawaii First to Harness Deep-Ocean Temperatures for Power (scientificamerican.com)
26 points by deegles 5 hours ago | 20 comments
29.
NASA's 1975 Graphics Standards Manual (slate.com)
33 points by ForHackernews 12 hours ago | 8 comments
30.
DPDK: Data Plane Development Kit (dpdk.org)
37 points by pjf 14 hours ago | 1 comment
More

Applications are open for YC Winter 2016

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: