Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
Guess my word
(simbase.org)
3 points
by
ColinWright
32 minutes ago
|
discuss
2.
Vulcan: A JavaScript Automated Proof System
(rmarcus.info)
9 points
by
beefman
3 hours ago
|
3 comments
3.
Call Me Maybe: MariaDB Galera Cluster
(aphyr.com)
256 points
by
akerl_
15 hours ago
|
86 comments
4.
iVe – Infotainment and Vehicle System Forensics
(berla.co)
41 points
by
tlack
7 hours ago
|
23 comments
5.
W^X policy violation affects Windows drivers compiled in VS 2013 and previous
(codeinsecurity.wordpress.com)
93 points
by
mmastrac
11 hours ago
|
25 comments
6.
CS Unplugged: Computer Science Without a Computer
(csunplugged.org)
343 points
by
avinassh
17 hours ago
|
80 comments
7.
Procedural Dungeon Generation Algorithm
(gamasutra.com)
162 points
by
ingve
16 hours ago
|
39 comments
8.
The Weight
(theplayerstribune.com)
106 points
by
pmcpinto
14 hours ago
|
7 comments
9.
How Secure Channels Attempted to Intimidate a Critic and Failed Spectacularly
(popehat.com)
206 points
by
tptacek
16 hours ago
|
25 comments
10.
St. Petersburg paradox
(wikipedia.org)
106 points
by
gmac
20 hours ago
|
61 comments
11.
You don’t need a remote-controlled iKettle
(simple-living-in-suffolk.co.uk)
26 points
by
edward
3 hours ago
|
15 comments
12.
Lost C64 Games: Daffy Duck – 1992 Hi-Tec
(gamesthatwerent.com)
154 points
by
ingve
18 hours ago
|
43 comments
13.
Judge’s Ruling Offers Peek into Private Equity’s Secret World
(nytimes.com)
23 points
by
Ankaios
5 hours ago
|
11 comments
14.
The Alternate Universe of Soviet Arcade Games
(atlasobscura.com)
78 points
by
lermontov
17 hours ago
|
25 comments
15.
Under the Hood of the Amazon EC2 Container Service
(allthingsdistributed.com)
73 points
by
signaler
16 hours ago
|
20 comments
16.
An Analysis of China’s “Great Cannon”
(usenix.org)
77 points
by
sasvari
19 hours ago
|
1 comment
17.
Dead Code Should Be Buried – Why I Didn't Contribute to NLTK
(spacy.io)
97 points
by
Smerity
7 hours ago
|
42 comments
18.
Ada Lovelace: Enchantress of abstraction
(nature.com)
48 points
by
mkempe
14 hours ago
|
17 comments
19.
Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms
(samvartaka.github.io)
85 points
by
mukyu
18 hours ago
|
6 comments
20.
Generate command-line completions using a simple DSL
(github.com)
35 points
by
dmmalam
13 hours ago
|
3 comments
21.
Rosalind, a platform for learning bioinformatics and programming
(rosalind.info)
36 points
by
aarestad
15 hours ago
|
4 comments
22.
Linguistic Harbingers of Betrayal
(vene.ro)
82 points
by
gcv
20 hours ago
|
12 comments
23.
Show HN: Libsoundio 1.0.0 – cross-platform audio input and output
(libsound.io)
103 points
by
AndyKelley
16 hours ago
|
27 comments
24.
Rosatom invites Google and Facebook to store data near nuclear power plant
(rbth.co.uk)
12 points
by
Sami_Lehtinen
4 hours ago
|
5 comments
25.
Change the way people create things online. Join Padlet as a Front end engineer
(angel.co)
2 hours ago
26.
Monads in Scheme
(okmij.org)
94 points
by
amirouche
19 hours ago
|
15 comments
27.
Picoc: A very small C interpreter for scripting
(github.com)
76 points
by
alecco
17 hours ago
|
25 comments
28.
Learn by Implementation: K-Nearest Neighbor
(depiesml.wordpress.com)
46 points
by
vonnik
16 hours ago
|
4 comments
29.
Hawaii First to Harness Deep-Ocean Temperatures for Power
(scientificamerican.com)
35 points
by
deegles
11 hours ago
|
30 comments
30.
Parkinsons-Like Neurodegenerative Disease Linked to Prion
(acs.org)
62 points
by
cryoshon
19 hours ago
|
24 comments
More
Applications are open for YC Winter 2016
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: