Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
IBM Watson correctly diagnoses a form of leukemia
(
siliconangle.com
)
25 points
by
adamnemecek
1 hour ago
|
hide
|
4 comments
2.
Tabby's star is dimming at an incredible rate
(
sciencealert.com
)
212 points
by
ChuckMcM
6 hours ago
|
hide
|
92 comments
3.
The 39th Root of 92
(
bit-player.org
)
22 points
by
bit-player
2 hours ago
|
hide
|
discuss
4.
A x64 OS #1: UEFI
(
kazlauskas.me
)
161 points
by
based2
7 hours ago
|
hide
|
36 comments
5.
Lithium-air batteries: Their time has come
(
economist.com
)
30 points
by
mdani
2 hours ago
|
hide
|
24 comments
6.
Superblocks: how Barcelona is taking city streets back from cars
(
vox.com
)
266 points
by
based2
11 hours ago
|
hide
|
149 comments
7.
Hask is not a category
(
andrej.com
)
31 points
by
snaky
2 hours ago
|
hide
|
8 comments
8.
Show HN: Set of trained deep learning models for computer vision
(
github.com
)
62 points
by
fchollet
5 hours ago
|
hide
|
6 comments
9.
Firejail – security sandbox
(
firejail.wordpress.com
)
19 points
by
simonpure
3 hours ago
|
hide
|
1 comment
10.
The brain's reward circuitry regulates immunity
(
nature.com
)
55 points
by
danielmorozoff
5 hours ago
|
hide
|
11 comments
11.
Show HN: Make Slack Bots in Java
(
github.com
)
31 points
by
ramswaroop
3 hours ago
|
hide
|
13 comments
12.
Eskil – a GUI front end to diff
(
tcl.tk
)
20 points
by
networked
3 hours ago
|
hide
|
2 comments
13.
DLS, the digital logic simulator game
(
itch.io
)
74 points
by
jsnell
8 hours ago
|
hide
|
13 comments
14.
Throughput vs. Latency and Lock-Free vs. Wait-Free
(
concurrencyfreaks.blogspot.com
)
96 points
by
ingve
10 hours ago
|
hide
|
8 comments
15.
From Linear Models to Machine Learning (draft) [pdf]
(
ucdavis.edu
)
117 points
by
sonabinu
10 hours ago
|
hide
|
13 comments
16.
PlayStation Vita Exploit Reverse Engineering Challenge
(
yifan.lu
)
95 points
by
gdk
10 hours ago
|
hide
|
8 comments
17.
Implementation of various string similarity and distance algorithms in Java
(
github.com
)
66 points
by
based2
10 hours ago
|
hide
|
15 comments
18.
The Code: A declassified hostage rescue story (2015)
(
theverge.com
)
34 points
by
wglb
7 hours ago
|
hide
|
4 comments
19.
Saving social media for posterity
(
nytimes.com
)
29 points
by
mattdennewitz
6 hours ago
|
hide
|
8 comments
20.
Sheriff Raids House to Find Anonymous Blogger Who Called Him Corrupt
(
theintercept.com
)
209 points
by
guiambros
8 hours ago
|
hide
|
51 comments
21.
Binary Ninja has been released
(
binary.ninja
)
3 points
by
Philipp__
1 hour ago
|
hide
|
discuss
22.
High-Fidelity Quantum Logic Gates
(
aps.org
)
25 points
by
gk1
5 hours ago
|
hide
|
2 comments
23.
Desktop privacy & security of web browsers on Linux part 1: concepts and theory
(
nexlab.net
)
63 points
by
nextime
9 hours ago
|
hide
|
6 comments
24.
Avalonia Alpha 4 – A cross-platform .NET UI framework
(
grokys.github.io
)
77 points
by
grokys
12 hours ago
|
hide
|
15 comments
25.
API providing threat analysis of any given IP address
(
fraudguard.io
)
85 points
by
dontbesalty
7 hours ago
|
hide
|
56 comments
26.
Frequent Password Changes Is a Bad Security Idea
(
schneier.com
)
17 points
by
alanfranzoni
1 hour ago
|
hide
|
3 comments
27.
Bitfinex Interim Update
(
bitfinex.com
)
20 points
by
Heliosmaster
6 hours ago
|
hide
|
19 comments
28.
Every Year on August 5th, the Curiosity Rover Sings a Lonely Birthday Song
(
curiosity.com
)
77 points
by
s_q_b
14 hours ago
|
hide
|
35 comments
29.
South Koreans use emoji to express playful sentiments they wouldn’t utter aloud
(
1843magazine.com
)
48 points
by
r0n0j0y
10 hours ago
|
hide
|
19 comments
30.
“EFI? Intel has been trying to shove that down our throats for years.” (2003)
(
groups.google.com
)
43 points
by
yuhong
3 hours ago
|
hide
|
12 comments
More
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: