Hacker News new | comments | show | ask | jobs | submit login
1. This JPEG is also a webpage (coredump.cx)
135 points by cocoflunchy 1 hour ago | hide | 62 comments
2. Show HN: Generating fantasy maps – an interactive exploration (mewo2.com)
492 points by mewo2 5 hours ago | hide | 31 comments
3. Show HN: Give 7B people an instant physical address (github.com)
195 points by roberdam 5 hours ago | hide | 114 comments
4. Type Punning Functions in C (evanmiller.org)
36 points by heliostatic 1 hour ago | hide | 13 comments
5. FreeBSD Core statement on recent freebsd-update and related vulnerabilities (freebsd.org)
67 points by werid 3 hours ago | hide | 7 comments
6. Microsoft proves backdoor keys are a bad idea (theregister.co.uk)
59 points by ChuckMcM 1 hour ago | hide | 10 comments
7. The Million-Key Question: Investigating the Origins of RSA Public Keys (usenix.org)
14 points by dc352 1 hour ago | hide | discuss
8. Don Bateman’s terrain mapping device (bloomberg.com)
54 points by forrest_t 3 hours ago | hide | 16 comments
9. Image Completion with Deep Learning in TensorFlow (bamos.github.io)
84 points by semanser 5 hours ago | hide | 3 comments
10. Python 3 on Google App Engine flexible environment now in beta (googleblog.com)
38 points by arouzrokh 49 minutes ago | hide | 7 comments
11. Why It Doesn't Pay to Be a People Pleaser (berkeley.edu)
63 points by alwaysmetara 2 hours ago | hide | 33 comments
12. American Bar Association votes to DRM referenced material made public (boingboing.net)
122 points by walterbell 1 hour ago | hide | 51 comments
13. How does gdb work? (jvns.ca)
254 points by deafcalculus 11 hours ago | hide | 42 comments
14. Gathering honey from a weed (2013) (the-life-i-read.blogspot.com)
17 points by aaron695 2 hours ago | hide | 4 comments
15. Why scaling and parallelism remain hard even with new tools and languages (erlang-solutions.com)
25 points by andradinu 3 hours ago | hide | 4 comments
16. I don't think the Port Authority would like it if you looked at this photo (plus.google.com)
159 points by jrockway 1 hour ago | hide | 68 comments
17. Ask HN: What are good reads for designing APIs?
34 points by adnanh 1 hour ago | hide | 17 comments
18. Secure Golden Key Boot (rol.im)
162 points by dmitrygr 10 hours ago | hide | 44 comments
19. From first principles: Why I bet on Scala.js (lihaoyi.com)
17 points by lihaoyi 2 hours ago | hide | 5 comments
20. Love Logistics? We're changing the way inventory is distributed iCracked (YC W12)
1 hour ago | hide
21. Flash and Chrome (googleblog.com)
227 points by rayshan 12 hours ago | hide | 135 comments
22. Mom macro set for groff (schaffter.ca)
6 points by Tomte 1 hour ago | hide | discuss
23. Flip Feng Shui: A new cross-VM exploitation vector (vusec.net)
39 points by Rafert 5 hours ago | hide | 4 comments
24. Librevault: Open source zero-knowledge peer-to-peer file sync (librevault.com)
33 points by im_dario 3 hours ago | hide | 7 comments
25. MASSCAN: Mass IP port scanner (github.com)
44 points by ntumlin 5 hours ago | hide | 29 comments
26. A TCP weakness in Linux systems allows network traffic hijack (isssource.com)
89 points by attilagyorffy 8 hours ago | hide | 18 comments
27. The boss, not the workload, causes workplace depression (sciencenordic.com)
111 points by signa11 3 hours ago | hide | 24 comments
28. On Cybersecurity and Being Targeted (kennethreitz.org)
245 points by kenneth_reitz 14 hours ago | hide | 106 comments
29. How to play a lot of different video games with the same algorithm (togelius.blogspot.com)
3 points by togelius 50 minutes ago | hide | 1 comment
30. Distraction Can Make You a Faster Cyclist (nautil.us)
6 points by dnetesn 1 hour ago | hide | 2 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: