Hacker News new | comments | show | ask | jobs | submit login
1. IBM Watson correctly diagnoses a form of leukemia (siliconangle.com)
25 points by adamnemecek 1 hour ago | hide | 4 comments
2. Tabby's star is dimming at an incredible rate (sciencealert.com)
212 points by ChuckMcM 6 hours ago | hide | 92 comments
3. The 39th Root of 92 (bit-player.org)
22 points by bit-player 2 hours ago | hide | discuss
4. A x64 OS #1: UEFI (kazlauskas.me)
161 points by based2 7 hours ago | hide | 36 comments
5. Lithium-air batteries: Their time has come (economist.com)
30 points by mdani 2 hours ago | hide | 24 comments
6. Superblocks: how Barcelona is taking city streets back from cars (vox.com)
266 points by based2 11 hours ago | hide | 149 comments
7. Hask is not a category (andrej.com)
31 points by snaky 2 hours ago | hide | 8 comments
8. Show HN: Set of trained deep learning models for computer vision (github.com)
62 points by fchollet 5 hours ago | hide | 6 comments
9. Firejail – security sandbox (firejail.wordpress.com)
19 points by simonpure 3 hours ago | hide | 1 comment
10. The brain's reward circuitry regulates immunity (nature.com)
55 points by danielmorozoff 5 hours ago | hide | 11 comments
11. Show HN: Make Slack Bots in Java (github.com)
31 points by ramswaroop 3 hours ago | hide | 13 comments
12. Eskil – a GUI front end to diff (tcl.tk)
20 points by networked 3 hours ago | hide | 2 comments
13. DLS, the digital logic simulator game (itch.io)
74 points by jsnell 8 hours ago | hide | 13 comments
14. Throughput vs. Latency and Lock-Free vs. Wait-Free (concurrencyfreaks.blogspot.com)
96 points by ingve 10 hours ago | hide | 8 comments
15. From Linear Models to Machine Learning (draft) [pdf] (ucdavis.edu)
117 points by sonabinu 10 hours ago | hide | 13 comments
16. PlayStation Vita Exploit Reverse Engineering Challenge (yifan.lu)
95 points by gdk 10 hours ago | hide | 8 comments
17. Implementation of various string similarity and distance algorithms in Java (github.com)
66 points by based2 10 hours ago | hide | 15 comments
18. The Code: A declassified hostage rescue story (2015) (theverge.com)
34 points by wglb 7 hours ago | hide | 4 comments
19. Saving social media for posterity (nytimes.com)
29 points by mattdennewitz 6 hours ago | hide | 8 comments
20. Sheriff Raids House to Find Anonymous Blogger Who Called Him Corrupt (theintercept.com)
209 points by guiambros 8 hours ago | hide | 51 comments
21. Binary Ninja has been released (binary.ninja)
3 points by Philipp__ 1 hour ago | hide | discuss
22. High-Fidelity Quantum Logic Gates (aps.org)
25 points by gk1 5 hours ago | hide | 2 comments
23. Desktop privacy & security of web browsers on Linux part 1: concepts and theory (nexlab.net)
63 points by nextime 9 hours ago | hide | 6 comments
24. Avalonia Alpha 4 – A cross-platform .NET UI framework (grokys.github.io)
77 points by grokys 12 hours ago | hide | 15 comments
25. API providing threat analysis of any given IP address (fraudguard.io)
85 points by dontbesalty 7 hours ago | hide | 56 comments
26. Frequent Password Changes Is a Bad Security Idea (schneier.com)
17 points by alanfranzoni 1 hour ago | hide | 3 comments
27. Bitfinex Interim Update (bitfinex.com)
20 points by Heliosmaster 6 hours ago | hide | 19 comments
28. Every Year on August 5th, the Curiosity Rover Sings a Lonely Birthday Song (curiosity.com)
77 points by s_q_b 14 hours ago | hide | 35 comments
29. South Koreans use emoji to express playful sentiments they wouldn’t utter aloud (1843magazine.com)
48 points by r0n0j0y 10 hours ago | hide | 19 comments
30. “EFI? Intel has been trying to shove that down our throats for years.” (2003) (groups.google.com)
43 points by yuhong 3 hours ago | hide | 12 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: