Hacker Newsnew | comments | show | ask | jobs | submit login
1.
iVe – Infotainment and Vehicle System Forensics (berla.co)
33 points by tlack 3 hours ago | 11 comments
2.
Call Me Maybe: MariaDB Galera Cluster (aphyr.com)
229 points by akerl_ 11 hours ago | 76 comments
3.
W^X policy violation affects Windows drivers compiled in VS 2013 and previous (codeinsecurity.wordpress.com)
83 points by mmastrac 7 hours ago | 21 comments
4.
CS Unplugged: Computer Science Without a Computer (csunplugged.org)
304 points by avinassh 13 hours ago | 78 comments
5.
Judge’s Ruling Offers Peek into Private Equity’s Secret World (nytimes.com)
9 points by Ankaios 1 hour ago | 1 comment
6.
Procedural Dungeon Generation Algorithm (gamasutra.com)
144 points by ingve 12 hours ago | 36 comments
7.
Dead Code Should Be Buried – Why I Didn't Contribute to NLTK (spacy.io)
67 points by Smerity 3 hours ago | 27 comments
8.
The Weight (theplayerstribune.com)
84 points by pmcpinto 10 hours ago | 4 comments
9.
How Secure Channels Attempted to Intimidate a Critic and Failed Spectacularly (popehat.com)
181 points by tptacek 12 hours ago | 23 comments
10.
St. Petersburg paradox (wikipedia.org)
86 points by gmac 16 hours ago | 55 comments
11.
Lost C64 Games: Daffy Duck – 1992 Hi-Tec (gamesthatwerent.com)
146 points by ingve 14 hours ago | 39 comments
12.
The Alternate Universe of Soviet Arcade Games (atlasobscura.com)
69 points by lermontov 13 hours ago | 20 comments
13.
Generate command-line completions using a simple DSL (github.com)
31 points by dmmalam 9 hours ago | 1 comment
14.
Under the Hood of the Amazon EC2 Container Service (allthingsdistributed.com)
62 points by signaler 12 hours ago | 19 comments
15.
Linguistic Harbingers of Betrayal (vene.ro)
73 points by gcv 16 hours ago | 12 comments
16.
An Analysis of China’s “Great Cannon” (usenix.org)
70 points by sasvari 15 hours ago | 1 comment
17.
Ada Lovelace: Enchantress of abstraction (nature.com)
41 points by mkempe 10 hours ago | 18 comments
18.
Rosalind, a platform for learning bioinformatics and programming (rosalind.info)
31 points by aarestad 11 hours ago | 3 comments
19.
Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms (samvartaka.github.io)
76 points by mukyu 14 hours ago | 6 comments
20.
Show HN: Libsoundio 1.0.0 – cross-platform audio input and output (libsound.io)
93 points by AndyKelley 12 hours ago | 27 comments
21.
Monads in Scheme (okmij.org)
87 points by amirouche 15 hours ago | 15 comments
22. The Muse (YC W12) Is Hiring an Office Manager in NYC (themuse.com)
2 hours ago
23.
Learn by Implementation: K-Nearest Neighbor (depiesml.wordpress.com)
41 points by vonnik 12 hours ago | 3 comments
24.
Picoc: A very small C interpreter for scripting (github.com)
71 points by alecco 13 hours ago | 21 comments
25.
No One to Rescue Me from My Drinking (nytimes.com)
66 points by kareemm 6 hours ago | 64 comments
26.
Hawaii First to Harness Deep-Ocean Temperatures for Power (scientificamerican.com)
29 points by deegles 7 hours ago | 22 comments
27.
DPDK: Data Plane Development Kit (dpdk.org)
40 points by pjf 16 hours ago | 2 comments
28.
OOSMOS – The Object-Oriented State Machine Operating System (oosmos.com)
34 points by zzglenm 11 hours ago | 7 comments
29.
Anderson.vim: Dark vim colorscheme based on colors from Wes Anderson films (github.com)
32 points by tambourine_man 5 hours ago | 8 comments
30.
NASA's 1975 Graphics Standards Manual (slate.com)
34 points by ForHackernews 14 hours ago | 10 comments
More

Applications are open for YC Winter 2016

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: