Hacker News new | comments | show | ask | jobs | submit login
1. Show HN: Generating fantasy maps – an interactive exploration (mewo2.com)
408 points by mewo2 4 hours ago | hide | 21 comments
2. Women’s Gymnastics Deserves Better TV Coverage (newyorker.com)
50 points by r-w 1 hour ago | hide | 28 comments
3. Why It Doesn't Pay to Be a People Pleaser (berkeley.edu)
26 points by alwaysmetara 1 hour ago | hide | 11 comments
4. Show HN: Give 7B people an instant physical address (github.com)
157 points by roberdam 4 hours ago | hide | 99 comments
5. Type Punning Functions in C (evanmiller.org)
13 points by heliostatic 28 minutes ago | hide | 1 comment
6. FreeBSD Core statement on recent freebsd-update and related vulnerabilities (freebsd.org)
51 points by werid 2 hours ago | hide | 6 comments
7. American Bar Association votes to DRM the law, put it behind a EULA (boingboing.net)
89 points by walterbell 58 minutes ago | hide | 26 comments
8. Eliminating the largest cause of death in jetliner accidents (bloomberg.com)
36 points by forrest_t 2 hours ago | hide | 5 comments
9. This JPEG is also a webpage (coredump.cx)
6 points by cocoflunchy 28 minutes ago | hide | discuss
10. Image Completion with Deep Learning in TensorFlow (bamos.github.io)
62 points by semanser 4 hours ago | hide | 2 comments
11. How does gdb work? (jvns.ca)
236 points by deafcalculus 10 hours ago | hide | 39 comments
12. I don't think the Port Authority would like it if you looked at this photo (plus.google.com)
98 points by jrockway 48 minutes ago | hide | 23 comments
13. Love Logistics? We're changing the way inventory is distributed iCracked (YC W12)
50 minutes ago | hide
14. Gathering honey from a weed (2013) (the-life-i-read.blogspot.com)
9 points by aaron695 1 hour ago | hide | 2 comments
15. Why scaling and parallelism remain hard even with new tools and languages (erlang-solutions.com)
14 points by andradinu 2 hours ago | hide | 1 comment
16. Microsoft proves backdoor keys are a bad idea (theregister.co.uk)
3 points by ChuckMcM 16 minutes ago | hide | discuss
17. Secure Golden Key Boot (rol.im)
155 points by dmitrygr 9 hours ago | hide | 41 comments
18. Flip Feng Shui: A new cross-VM exploitation vector (vusec.net)
35 points by Rafert 4 hours ago | hide | 4 comments
19. MASSCAN: Mass IP port scanner (github.com)
37 points by ntumlin 4 hours ago | hide | 28 comments
20. Flash and Chrome (googleblog.com)
219 points by rayshan 11 hours ago | hide | 128 comments
21. A TCP weakness in Linux systems allows network traffic hijack (isssource.com)
80 points by attilagyorffy 7 hours ago | hide | 15 comments
22. The boss, not the workload, causes workplace depression (sciencenordic.com)
86 points by signa11 2 hours ago | hide | 18 comments
23. On Cybersecurity and Being Targeted (kennethreitz.org)
237 points by kenneth_reitz 13 hours ago | hide | 101 comments
24. Cursory hack – Fake address bar interaction (jameshfisher.github.io)
70 points by benjaminbenben 6 hours ago | hide | 28 comments
25. R: text analysis of Trump’s tweets (r-bloggers.com)
74 points by ingve 2 hours ago | hide | 5 comments
26. Ask HN: 8 years working, now 3-4 months off to learn. Looking for advice
161 points by ramblerman 10 hours ago | hide | 56 comments
27. Librevault: Open source zero-knowledge peer-to-peer file sync (librevault.com)
18 points by im_dario 2 hours ago | hide | 3 comments
28. Off-Path TCP Exploits: Global Rate Limit Considered Dangerous [pdf] (ucr.edu)
24 points by jfindley 5 hours ago | hide | discuss
29. Playability Test of 100 Humble Bundle Games on Linux (forteller.net)
146 points by unhammer 7 hours ago | hide | 99 comments
30. Ask HN: What are good reads for designing APIs?
3 points by adnanh 14 minutes ago | hide | 1 comment
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: