Hacker News new | comments | show | ask | jobs | submit login
1. A x64 OS #1: UEFI (kazlauskas.me)
127 points by based2 4 hours ago | hide | 23 comments
2. Tabby's star is dimming at an incredible rate (sciencealert.com)
127 points by ChuckMcM 3 hours ago | hide | 53 comments
3. Superblocks: how Barcelona is taking city streets back from cars (vox.com)
220 points by based2 8 hours ago | hide | 105 comments
4. Show HN: Set of trained deep learning models for computer vision (github.com)
37 points by fchollet 2 hours ago | hide | 5 comments
5. Show HN: Make Slack Bots in Java in mere moments (github.com)
8 points by ramswaroop 49 minutes ago | hide | 2 comments
6. The brain's reward circuitry regulates immunity (nature.com)
29 points by danielmorozoff 2 hours ago | hide | 3 comments
7. API providing threat analysis of any given IP address (fraudguard.io)
65 points by dontbesalty 4 hours ago | hide | 42 comments
8. Saving social media for posterity (nytimes.com)
22 points by mattdennewitz 3 hours ago | hide | 8 comments
9. From Linear Models to Machine Learning (draft) [pdf] (ucdavis.edu)
100 points by sonabinu 7 hours ago | hide | 10 comments
10. PlayStation Vita Exploit Reverse Engineering Challenge (yifan.lu)
84 points by gdk 7 hours ago | hide | 8 comments
11. Throughput vs. Latency and Lock-Free vs. Wait-Free (concurrencyfreaks.blogspot.com)
78 points by ingve 7 hours ago | hide | 3 comments
12. DLS, the digital logic simulator game (itch.io)
51 points by jsnell 5 hours ago | hide | 12 comments
13. “EFI? Intel has been trying to shove that down our throats for years.” (2003) (groups.google.com)
29 points by yuhong 50 minutes ago | hide | 2 comments
14. Ask HN: Anyone have more information on latest Snowden tweet?
27 points by bballer 31 minutes ago | hide | 6 comments
15. Implementation of various string similarity and distance algorithms in Java (github.com)
56 points by based2 7 hours ago | hide | 10 comments
16. Sheriff Raids House to Find Anonymous Blogger Who Called Him Corrupt (theintercept.com)
169 points by guiambros 5 hours ago | hide | 31 comments
17. THE CODE: A declassified and unbelievable hostage rescue story (2015) (theverge.com)
19 points by wglb 4 hours ago | hide | 1 comment
18. Desktop privacy & security of web browsers on Linux part 1: concepts and theory (nexlab.net)
52 points by nextime 6 hours ago | hide | 5 comments
19. Bitfinex Interim Update (bitfinex.com)
11 points by Heliosmaster 3 hours ago | hide | 15 comments
20. South Koreans use emoji to express playful sentiments they wouldn’t utter aloud (1843magazine.com)
38 points by r0n0j0y 7 hours ago | hide | 12 comments
21. Avalonia Alpha 4 – A cross-platform .NET UI framework (grokys.github.io)
65 points by grokys 9 hours ago | hide | 12 comments
22. Every Year on August 5th, the Curiosity Rover Sings a Lonely Birthday Song (curiosity.com)
65 points by s_q_b 11 hours ago | hide | 31 comments
23. Can Science Breed the Next Secretariat? (nautil.us)
18 points by dnetesn 6 hours ago | hide | 7 comments
24. GiveCampus is looking for Ruby engineers to bring high tech to education
2 hours ago | hide
25. The women who made communication with outer space possible (pri.org)
10 points by molecule 52 minutes ago | hide | discuss
26. Americans Don't Care About Prison Phone Exploitation, Says FCC Official (vice.com)
73 points by dsr12 5 hours ago | hide | 50 comments
27. Stack Computers: the new wave (1989) (cmu.edu)
17 points by kercker 6 hours ago | hide | 11 comments
28. What I learned from the Chinese about our Indian online market (reverieinc.com)
76 points by pakhibagai 13 hours ago | hide | 51 comments
29. Outburst flood at 1920 BCE supports historicity of China’s Great Flood (sciencemag.org)
21 points by diodorus 8 hours ago | hide | 2 comments
30. Kinesis Advantage 2 (kinesis-ergo.com)
105 points by afshinmeh 9 hours ago | hide | 134 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: