Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
Dead Code Should Be Buried – Why I Didn't Contribute to NLTK
(spacy.io)
40 points
by
Smerity
1 hour ago
|
6 comments
2.
New tool for police: vehicle system forensics
(berla.co)
20 points
by
tlack
1 hour ago
|
5 comments
3.
W^X policy violation affects Windows drivers compiled in VS 2013 and previous
(codeinsecurity.wordpress.com)
78 points
by
mmastrac
5 hours ago
|
21 comments
4.
Call Me Maybe: MariaDB Galera Cluster
(aphyr.com)
220 points
by
akerl_
9 hours ago
|
76 comments
5.
CS Unplugged: Computer Science Without a Computer
(csunplugged.org)
290 points
by
avinassh
11 hours ago
|
77 comments
6.
Procedural Dungeon Generation Algorithm
(gamasutra.com)
131 points
by
ingve
10 hours ago
|
28 comments
7.
The Muse (YC W12) Is Hiring an Experienced Office Manager in NYC
(themuse.com)
11 minutes ago
8.
The Weight
(theplayerstribune.com)
67 points
by
pmcpinto
8 hours ago
|
3 comments
9.
St. Petersburg paradox
(wikipedia.org)
80 points
by
gmac
14 hours ago
|
53 comments
10.
How Secure Channels Attempted to Intimidate a Critic and Failed Spectacularly
(popehat.com)
167 points
by
tptacek
11 hours ago
|
20 comments
11.
Lost C64 Games: Daffy Duck – 1992 Hi-Tec
(gamesthatwerent.com)
141 points
by
ingve
12 hours ago
|
37 comments
12.
The Alternate Universe of Soviet Arcade Games
(atlasobscura.com)
61 points
by
lermontov
11 hours ago
|
20 comments
13.
Generate command-line completions using a simple DSL
(github.com)
19 points
by
dmmalam
7 hours ago
|
discuss
14.
Anderson.vim: Dark vim colorscheme based on colors from Wes Anderson films
(github.com)
16 points
by
tambourine_man
3 hours ago
|
6 comments
15.
Why drivers in China intentionally kill the pedestrians they hit
(slate.com)
155 points
by
fhinson
3 hours ago
|
145 comments
16.
Ada Lovelace: Enchantress of abstraction
(nature.com)
39 points
by
mkempe
8 hours ago
|
18 comments
17.
Under the Hood of the Amazon EC2 Container Service
(allthingsdistributed.com)
57 points
by
signaler
10 hours ago
|
18 comments
18.
Linguistic Harbingers of Betrayal
(vene.ro)
70 points
by
gcv
14 hours ago
|
12 comments
19.
An Analysis of China’s “Great Cannon”
(usenix.org)
63 points
by
sasvari
13 hours ago
|
1 comment
20.
No One to Rescue Me from My Drinking
(nytimes.com)
59 points
by
kareemm
4 hours ago
|
52 comments
21.
Rosalind, a platform for learning bioinformatics and programming
(rosalind.info)
29 points
by
aarestad
9 hours ago
|
3 comments
22.
Show HN: Libsoundio 1.0.0 – cross-platform audio input and output
(libsound.io)
85 points
by
AndyKelley
10 hours ago
|
27 comments
23.
Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms
(samvartaka.github.io)
71 points
by
mukyu
12 hours ago
|
4 comments
24.
Learn by Implementation: K-Nearest Neighbor
(depiesml.wordpress.com)
37 points
by
vonnik
10 hours ago
|
3 comments
25.
Monads in Scheme
(okmij.org)
84 points
by
amirouche
13 hours ago
|
15 comments
26.
Picoc: A very small C interpreter for scripting
(github.com)
69 points
by
alecco
11 hours ago
|
20 comments
27.
OOSMOS – The Object-Oriented State Machine Operating System
(oosmos.com)
33 points
by
zzglenm
9 hours ago
|
7 comments
28.
Hawaii First to Harness Deep-Ocean Temperatures for Power
(scientificamerican.com)
26 points
by
deegles
5 hours ago
|
20 comments
29.
NASA's 1975 Graphics Standards Manual
(slate.com)
33 points
by
ForHackernews
12 hours ago
|
8 comments
30.
DPDK: Data Plane Development Kit
(dpdk.org)
37 points
by
pjf
14 hours ago
|
1 comment
More
Applications are open for YC Winter 2016
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: