Hacker Newsnew | comments | show | ask | jobs | submit login
1.
Guess my word (simbase.org)
3 points by ColinWright 32 minutes ago | discuss
2.
Vulcan: A JavaScript Automated Proof System (rmarcus.info)
9 points by beefman 3 hours ago | 3 comments
3.
Call Me Maybe: MariaDB Galera Cluster (aphyr.com)
256 points by akerl_ 15 hours ago | 86 comments
4.
iVe – Infotainment and Vehicle System Forensics (berla.co)
41 points by tlack 7 hours ago | 23 comments
5.
W^X policy violation affects Windows drivers compiled in VS 2013 and previous (codeinsecurity.wordpress.com)
93 points by mmastrac 11 hours ago | 25 comments
6.
CS Unplugged: Computer Science Without a Computer (csunplugged.org)
343 points by avinassh 17 hours ago | 80 comments
7.
Procedural Dungeon Generation Algorithm (gamasutra.com)
162 points by ingve 16 hours ago | 39 comments
8.
The Weight (theplayerstribune.com)
106 points by pmcpinto 14 hours ago | 7 comments
9.
How Secure Channels Attempted to Intimidate a Critic and Failed Spectacularly (popehat.com)
206 points by tptacek 16 hours ago | 25 comments
10.
St. Petersburg paradox (wikipedia.org)
106 points by gmac 20 hours ago | 61 comments
11.
You don’t need a remote-controlled iKettle (simple-living-in-suffolk.co.uk)
26 points by edward 3 hours ago | 15 comments
12.
Lost C64 Games: Daffy Duck – 1992 Hi-Tec (gamesthatwerent.com)
154 points by ingve 18 hours ago | 43 comments
13.
Judge’s Ruling Offers Peek into Private Equity’s Secret World (nytimes.com)
23 points by Ankaios 5 hours ago | 11 comments
14.
The Alternate Universe of Soviet Arcade Games (atlasobscura.com)
78 points by lermontov 17 hours ago | 25 comments
15.
Under the Hood of the Amazon EC2 Container Service (allthingsdistributed.com)
73 points by signaler 16 hours ago | 20 comments
16.
An Analysis of China’s “Great Cannon” (usenix.org)
77 points by sasvari 19 hours ago | 1 comment
17.
Dead Code Should Be Buried – Why I Didn't Contribute to NLTK (spacy.io)
97 points by Smerity 7 hours ago | 42 comments
18.
Ada Lovelace: Enchantress of abstraction (nature.com)
48 points by mkempe 14 hours ago | 17 comments
19.
Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms (samvartaka.github.io)
85 points by mukyu 18 hours ago | 6 comments
20.
Generate command-line completions using a simple DSL (github.com)
35 points by dmmalam 13 hours ago | 3 comments
21.
Rosalind, a platform for learning bioinformatics and programming (rosalind.info)
36 points by aarestad 15 hours ago | 4 comments
22.
Linguistic Harbingers of Betrayal (vene.ro)
82 points by gcv 20 hours ago | 12 comments
23.
Show HN: Libsoundio 1.0.0 – cross-platform audio input and output (libsound.io)
103 points by AndyKelley 16 hours ago | 27 comments
24.
Rosatom invites Google and Facebook to store data near nuclear power plant (rbth.co.uk)
12 points by Sami_Lehtinen 4 hours ago | 5 comments
25. Change the way people create things online. Join Padlet as a Front end engineer (angel.co)
2 hours ago
26.
Monads in Scheme (okmij.org)
94 points by amirouche 19 hours ago | 15 comments
27.
Picoc: A very small C interpreter for scripting (github.com)
76 points by alecco 17 hours ago | 25 comments
28.
Learn by Implementation: K-Nearest Neighbor (depiesml.wordpress.com)
46 points by vonnik 16 hours ago | 4 comments
29.
Hawaii First to Harness Deep-Ocean Temperatures for Power (scientificamerican.com)
35 points by deegles 11 hours ago | 30 comments
30.
Parkinsons-Like Neurodegenerative Disease Linked to Prion (acs.org)
62 points by cryoshon 19 hours ago | 24 comments
More

Applications are open for YC Winter 2016

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: