Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
iVe – Infotainment and Vehicle System Forensics
(berla.co)
30 points
by
tlack
2 hours ago
|
10 comments
2.
W^X policy violation affects Windows drivers compiled in VS 2013 and previous
(codeinsecurity.wordpress.com)
83 points
by
mmastrac
6 hours ago
|
21 comments
3.
Call Me Maybe: MariaDB Galera Cluster
(aphyr.com)
224 points
by
akerl_
10 hours ago
|
76 comments
4.
Judge’s Ruling Offers Peek into Private Equity’s Secret World
(nytimes.com)
4 points
by
Ankaios
56 minutes ago
|
discuss
5.
CS Unplugged: Computer Science Without a Computer
(csunplugged.org)
296 points
by
avinassh
12 hours ago
|
78 comments
6.
Dead Code Should Be Buried – Why I Didn't Contribute to NLTK
(spacy.io)
62 points
by
Smerity
2 hours ago
|
22 comments
7.
Procedural Dungeon Generation Algorithm
(gamasutra.com)
135 points
by
ingve
11 hours ago
|
31 comments
8.
The Weight
(theplayerstribune.com)
76 points
by
pmcpinto
9 hours ago
|
4 comments
9.
How Secure Channels Attempted to Intimidate a Critic and Failed Spectacularly
(popehat.com)
179 points
by
tptacek
11 hours ago
|
23 comments
10.
St. Petersburg paradox
(wikipedia.org)
82 points
by
gmac
15 hours ago
|
54 comments
11.
Lost C64 Games: Daffy Duck – 1992 Hi-Tec
(gamesthatwerent.com)
145 points
by
ingve
13 hours ago
|
39 comments
12.
The Alternate Universe of Soviet Arcade Games
(atlasobscura.com)
64 points
by
lermontov
12 hours ago
|
20 comments
13.
Generate command-line completions using a simple DSL
(github.com)
27 points
by
dmmalam
8 hours ago
|
1 comment
14.
Under the Hood of the Amazon EC2 Container Service
(allthingsdistributed.com)
61 points
by
signaler
11 hours ago
|
18 comments
15.
The Muse (YC W12) Is Hiring an Office Manager in NYC
(themuse.com)
1 hour ago
16.
Linguistic Harbingers of Betrayal
(vene.ro)
72 points
by
gcv
15 hours ago
|
12 comments
17.
Ada Lovelace: Enchantress of abstraction
(nature.com)
39 points
by
mkempe
9 hours ago
|
18 comments
18.
An Analysis of China’s “Great Cannon”
(usenix.org)
68 points
by
sasvari
14 hours ago
|
1 comment
19.
Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms
(samvartaka.github.io)
75 points
by
mukyu
13 hours ago
|
6 comments
20.
Rosalind, a platform for learning bioinformatics and programming
(rosalind.info)
29 points
by
aarestad
10 hours ago
|
3 comments
21.
Show HN: Libsoundio 1.0.0 – cross-platform audio input and output
(libsound.io)
88 points
by
AndyKelley
11 hours ago
|
27 comments
22.
Monads in Scheme
(okmij.org)
85 points
by
amirouche
14 hours ago
|
15 comments
23.
Learn by Implementation: K-Nearest Neighbor
(depiesml.wordpress.com)
39 points
by
vonnik
11 hours ago
|
3 comments
24.
No One to Rescue Me from My Drinking
(nytimes.com)
61 points
by
kareemm
5 hours ago
|
58 comments
25.
Picoc: A very small C interpreter for scripting
(github.com)
70 points
by
alecco
12 hours ago
|
21 comments
26.
Hawaii First to Harness Deep-Ocean Temperatures for Power
(scientificamerican.com)
28 points
by
deegles
6 hours ago
|
21 comments
27.
OOSMOS – The Object-Oriented State Machine Operating System
(oosmos.com)
33 points
by
zzglenm
10 hours ago
|
7 comments
28.
DPDK: Data Plane Development Kit
(dpdk.org)
38 points
by
pjf
15 hours ago
|
2 comments
29.
Anderson.vim: Dark vim colorscheme based on colors from Wes Anderson films
(github.com)
28 points
by
tambourine_man
4 hours ago
|
6 comments
30.
NASA's 1975 Graphics Standards Manual
(slate.com)
33 points
by
ForHackernews
13 hours ago
|
9 comments
More
Applications are open for YC Winter 2016
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: