Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
iVe – Infotainment and Vehicle System Forensics
(berla.co)
33 points
by
tlack
3 hours ago
|
11 comments
2.
Call Me Maybe: MariaDB Galera Cluster
(aphyr.com)
229 points
by
akerl_
11 hours ago
|
76 comments
3.
W^X policy violation affects Windows drivers compiled in VS 2013 and previous
(codeinsecurity.wordpress.com)
83 points
by
mmastrac
7 hours ago
|
21 comments
4.
CS Unplugged: Computer Science Without a Computer
(csunplugged.org)
304 points
by
avinassh
13 hours ago
|
78 comments
5.
Judge’s Ruling Offers Peek into Private Equity’s Secret World
(nytimes.com)
9 points
by
Ankaios
1 hour ago
|
1 comment
6.
Procedural Dungeon Generation Algorithm
(gamasutra.com)
144 points
by
ingve
12 hours ago
|
36 comments
7.
Dead Code Should Be Buried – Why I Didn't Contribute to NLTK
(spacy.io)
67 points
by
Smerity
3 hours ago
|
27 comments
8.
The Weight
(theplayerstribune.com)
84 points
by
pmcpinto
10 hours ago
|
4 comments
9.
How Secure Channels Attempted to Intimidate a Critic and Failed Spectacularly
(popehat.com)
181 points
by
tptacek
12 hours ago
|
23 comments
10.
St. Petersburg paradox
(wikipedia.org)
86 points
by
gmac
16 hours ago
|
55 comments
11.
Lost C64 Games: Daffy Duck – 1992 Hi-Tec
(gamesthatwerent.com)
146 points
by
ingve
14 hours ago
|
39 comments
12.
The Alternate Universe of Soviet Arcade Games
(atlasobscura.com)
69 points
by
lermontov
13 hours ago
|
20 comments
13.
Generate command-line completions using a simple DSL
(github.com)
31 points
by
dmmalam
9 hours ago
|
1 comment
14.
Under the Hood of the Amazon EC2 Container Service
(allthingsdistributed.com)
62 points
by
signaler
12 hours ago
|
19 comments
15.
Linguistic Harbingers of Betrayal
(vene.ro)
73 points
by
gcv
16 hours ago
|
12 comments
16.
An Analysis of China’s “Great Cannon”
(usenix.org)
70 points
by
sasvari
15 hours ago
|
1 comment
17.
Ada Lovelace: Enchantress of abstraction
(nature.com)
41 points
by
mkempe
10 hours ago
|
18 comments
18.
Rosalind, a platform for learning bioinformatics and programming
(rosalind.info)
31 points
by
aarestad
11 hours ago
|
3 comments
19.
Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms
(samvartaka.github.io)
76 points
by
mukyu
14 hours ago
|
6 comments
20.
Show HN: Libsoundio 1.0.0 – cross-platform audio input and output
(libsound.io)
93 points
by
AndyKelley
12 hours ago
|
27 comments
21.
Monads in Scheme
(okmij.org)
87 points
by
amirouche
15 hours ago
|
15 comments
22.
The Muse (YC W12) Is Hiring an Office Manager in NYC
(themuse.com)
2 hours ago
23.
Learn by Implementation: K-Nearest Neighbor
(depiesml.wordpress.com)
41 points
by
vonnik
12 hours ago
|
3 comments
24.
Picoc: A very small C interpreter for scripting
(github.com)
71 points
by
alecco
13 hours ago
|
21 comments
25.
No One to Rescue Me from My Drinking
(nytimes.com)
66 points
by
kareemm
6 hours ago
|
64 comments
26.
Hawaii First to Harness Deep-Ocean Temperatures for Power
(scientificamerican.com)
29 points
by
deegles
7 hours ago
|
22 comments
27.
DPDK: Data Plane Development Kit
(dpdk.org)
40 points
by
pjf
16 hours ago
|
2 comments
28.
OOSMOS – The Object-Oriented State Machine Operating System
(oosmos.com)
34 points
by
zzglenm
11 hours ago
|
7 comments
29.
Anderson.vim: Dark vim colorscheme based on colors from Wes Anderson films
(github.com)
32 points
by
tambourine_man
5 hours ago
|
8 comments
30.
NASA's 1975 Graphics Standards Manual
(slate.com)
34 points
by
ForHackernews
14 hours ago
|
10 comments
More
Applications are open for YC Winter 2016
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: