Hacker Newsnew | comments | show | ask | jobs | submit login
1.
iVe – Infotainment and Vehicle System Forensics (berla.co)
30 points by tlack 2 hours ago | 10 comments
2.
W^X policy violation affects Windows drivers compiled in VS 2013 and previous (codeinsecurity.wordpress.com)
83 points by mmastrac 6 hours ago | 21 comments
3.
Call Me Maybe: MariaDB Galera Cluster (aphyr.com)
224 points by akerl_ 10 hours ago | 76 comments
4.
Judge’s Ruling Offers Peek into Private Equity’s Secret World (nytimes.com)
4 points by Ankaios 56 minutes ago | discuss
5.
CS Unplugged: Computer Science Without a Computer (csunplugged.org)
296 points by avinassh 12 hours ago | 78 comments
6.
Dead Code Should Be Buried – Why I Didn't Contribute to NLTK (spacy.io)
62 points by Smerity 2 hours ago | 22 comments
7.
Procedural Dungeon Generation Algorithm (gamasutra.com)
135 points by ingve 11 hours ago | 31 comments
8.
The Weight (theplayerstribune.com)
76 points by pmcpinto 9 hours ago | 4 comments
9.
How Secure Channels Attempted to Intimidate a Critic and Failed Spectacularly (popehat.com)
179 points by tptacek 11 hours ago | 23 comments
10.
St. Petersburg paradox (wikipedia.org)
82 points by gmac 15 hours ago | 54 comments
11.
Lost C64 Games: Daffy Duck – 1992 Hi-Tec (gamesthatwerent.com)
145 points by ingve 13 hours ago | 39 comments
12.
The Alternate Universe of Soviet Arcade Games (atlasobscura.com)
64 points by lermontov 12 hours ago | 20 comments
13.
Generate command-line completions using a simple DSL (github.com)
27 points by dmmalam 8 hours ago | 1 comment
14.
Under the Hood of the Amazon EC2 Container Service (allthingsdistributed.com)
61 points by signaler 11 hours ago | 18 comments
15. The Muse (YC W12) Is Hiring an Office Manager in NYC (themuse.com)
1 hour ago
16.
Linguistic Harbingers of Betrayal (vene.ro)
72 points by gcv 15 hours ago | 12 comments
17.
Ada Lovelace: Enchantress of abstraction (nature.com)
39 points by mkempe 9 hours ago | 18 comments
18.
An Analysis of China’s “Great Cannon” (usenix.org)
68 points by sasvari 14 hours ago | 1 comment
19.
Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms (samvartaka.github.io)
75 points by mukyu 13 hours ago | 6 comments
20.
Rosalind, a platform for learning bioinformatics and programming (rosalind.info)
29 points by aarestad 10 hours ago | 3 comments
21.
Show HN: Libsoundio 1.0.0 – cross-platform audio input and output (libsound.io)
88 points by AndyKelley 11 hours ago | 27 comments
22.
Monads in Scheme (okmij.org)
85 points by amirouche 14 hours ago | 15 comments
23.
Learn by Implementation: K-Nearest Neighbor (depiesml.wordpress.com)
39 points by vonnik 11 hours ago | 3 comments
24.
No One to Rescue Me from My Drinking (nytimes.com)
61 points by kareemm 5 hours ago | 58 comments
25.
Picoc: A very small C interpreter for scripting (github.com)
70 points by alecco 12 hours ago | 21 comments
26.
Hawaii First to Harness Deep-Ocean Temperatures for Power (scientificamerican.com)
28 points by deegles 6 hours ago | 21 comments
27.
OOSMOS – The Object-Oriented State Machine Operating System (oosmos.com)
33 points by zzglenm 10 hours ago | 7 comments
28.
DPDK: Data Plane Development Kit (dpdk.org)
38 points by pjf 15 hours ago | 2 comments
29.
Anderson.vim: Dark vim colorscheme based on colors from Wes Anderson films (github.com)
28 points by tambourine_man 4 hours ago | 6 comments
30.
NASA's 1975 Graphics Standards Manual (slate.com)
33 points by ForHackernews 13 hours ago | 9 comments
More

Applications are open for YC Winter 2016

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: