Hacker News new | comments | show | ask | jobs | submit login
1. Marie Curie Got Her Start at a Secret University for Women (atlasobscura.com)
50 points by lermontov 1 hour ago | hide | 3 comments
2. Building fast.com (netflix.com)
243 points by samber 4 hours ago | hide | 100 comments
3. Eating the fruit of the world's most dangerous tree (nih.gov)
42 points by donquichotte 1 hour ago | hide | 26 comments
4. 1400 km of optical fiber connect optical clocks in France and Germany (sciencebulletin.org)
29 points by upen 1 hour ago | hide | 2 comments
5. AI’s Language Problem (technologyreview.com)
239 points by punnerud 7 hours ago | hide | 157 comments
6. Fast and Accurate Document Detection for Scanning (dropbox.com)
152 points by samber 7 hours ago | hide | 43 comments
7. Researchers crack open malware that hid for 5 years (arstechnica.com)
287 points by rando444 11 hours ago | hide | 144 comments
8. Updating Torrents via DHT Mutable Items (bittorrent.org)
28 points by sktrdie 2 hours ago | hide | 7 comments
9. APL Tutorial (zerobugsandprogramfaster.net)
88 points by ktRolster 7 hours ago | hide | 38 comments
10. An act to amend Financial and Corporations Codes relating to digital currency (ca.gov)
49 points by KeatonDunsford 4 hours ago | hide | 43 comments
11. Godot reaches 2.1 stable (godotengine.org)
26 points by qznc 59 minutes ago | hide | 5 comments
12. PyPy gets funding from Mozilla for Python 3.5 support (morepypy.blogspot.com)
195 points by progval 5 hours ago | hide | 47 comments
13. Bayesian Optimization for Collaborative Filtering with MLlib (sigopt.com)
15 points by Zephyr314 1 hour ago | hide | 7 comments
14. ZeroDB (YC S16) Provides Security for Enterprise Big Data in the Cloud (themacro.com)
67 points by stvnchn 4 hours ago | hide | 32 comments
15. How do we build encryption backdoors? (cryptographyengineering.com)
17 points by michael_fine 3 hours ago | hide | 2 comments
16. A Comprehensive Study on the Energy Efficiency of Java Thread-Safe Collections [pdf] (gustavopinto.github.io)
8 points by ghlp 1 hour ago | hide | 1 comment
17. Beyond Bitcoin – Part II: Blockchain-based systems without mining [pdf] (iacr.org)
31 points by grey-area 4 hours ago | hide | 16 comments
18. Rescale (YC W12) is hiring a security-focused software engineer
1 hour ago | hide
19. Q&A with Ed Catmull (themacro.com)
22 points by craigcannon 2 hours ago | hide | 6 comments
20. Hellwig Will Appeal VMware Ruling After Evidentiary Set Back in Lower Court (sfconservancy.org)
80 points by Rondom 8 hours ago | hide | 37 comments
21. America's First Medal at the Nazi Olympics Was for Town Planning (atlasobscura.com)
47 points by samclemens 7 hours ago | hide | 19 comments
22. Cjdns: a secure non-anonymous P2P network (github.com)
17 points by crasm 3 hours ago | hide | 1 comment
23. Toward practical quantum computers (mit.edu)
9 points by Lind5 2 hours ago | hide | discuss
24. The CIA’s 1944 Simple Sabotage Field Manual (2015) (openculture.com)
194 points by HugoDaniel 13 hours ago | hide | 51 comments
25. Linear regression (thegreenplace.net)
76 points by ingve 9 hours ago | hide | 35 comments
26. Evidence Mounts That Rembrandt Used Optics to Paint Self-Portraits (hyperallergic.com)
54 points by prismatic 8 hours ago | hide | 10 comments
27. Show HN: Knuckleball – An in-memory data structure server (github.com)
89 points by rodrigoalima99 10 hours ago | hide | 31 comments
28. Intel to buy deep-learning startup Nervana Systems for at least $350M (recode.net)
40 points by flinner 1 hour ago | hide | 7 comments
29. Google Compute Engine Incident #16015 (cloud.google.com)
123 points by Artemis2 7 hours ago | hide | 66 comments
30. Chrome 53 Beta: Shadow DOM, PaymentRequest, and Android Autoplay (chromium.org)
14 points by itayadler 1 hour ago | hide | 3 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: