Hacker News new | comments | show | ask | jobs | submit login
1. Digital Photography Course from Harvard (2013) (alison.com)
105 points by itsyogesh 3 hours ago | hide | 10 comments
2. The lost letters of the English alphabet (omgfacts.com)
123 points by 2dvisio 4 hours ago | hide | 53 comments
3. Stealing passwords from McDonald's users (finnwea.com)
345 points by chx 11 hours ago | hide | 94 comments
4. Dovecot audit sponsored by Mozilla complete auditor Cure53 “extremely impressed” (mozilla.org)
194 points by richardboegli 13 hours ago | hide | 53 comments
5. China has built the world’s largest bullet-train network (economist.com)
23 points by sohkamyung 3 hours ago | hide | 16 comments
6. SrsLTE: Open Source 3GPP LTE Library (github.com)
98 points by BuuQu9hu 9 hours ago | hide | 6 comments
7. Established education providers v new contenders (economist.com)
105 points by dhruvp 11 hours ago | hide | 24 comments
8. Naughty Strings: A list of strings likely to cause issues as user-input data (github.com)
663 points by caseysoftware 16 hours ago | hide | 106 comments
9. Google reveals its servers all contain custom security silicon (theregister.co.uk)
32 points by chris-at 1 hour ago | hide | 6 comments
10. Raspberry Pi Compute Module 3 out now (raspberrypi.org)
30 points by rbanffy 1 hour ago | hide | 3 comments
11. How many animals can one find in a random image? (wolfram.com)
94 points by soofy 14 hours ago | hide | 22 comments
12. Re-Frame: a Reagent Framework for Writing SPAs, in ClojureScript (github.com)
71 points by jdnier 8 hours ago | hide | 9 comments
13. The importance of neutral null for understanding evolution (nih.gov)
74 points by jonathansizz 12 hours ago | hide | 14 comments
14. Ask HN: What's the best computer science book you've read recently?
379 points by bobnarizes 14 hours ago | hide | 107 comments
15. Ian's Shoelace Site (fieggen.com)
555 points by Tomte 20 hours ago | hide | 94 comments
16. Wide Impact: Highly Effective Gmail Phishing Technique Being Exploited (wordfence.com)
33 points by aburan28 9 hours ago | hide | 13 comments
17. Coroutine iters in Common Lisp (vicsydev.blogspot.com)
51 points by codr4life 14 hours ago | hide | 11 comments
18. Show HN: Crafting Interpreters – A handbook for making programming languages (craftinginterpreters.com)
296 points by munificent 16 hours ago | hide | 45 comments
19. We Reverse Engineered 16K Apps (hackernoon.com)
72 points by r721 6 hours ago | hide | 28 comments
20. President Obama's International Visits from 2009 to 2016 (arcgis.com)
41 points by espek07 6 hours ago | hide | 44 comments
21. Phone numbers are not proper verification (b1nary.ch)
71 points by herbst 7 hours ago | hide | 95 comments
22. Guide on how to design keyboard PCBs (github.com)
73 points by Adrock 14 hours ago | hide | 15 comments
23. Google and Facebook ad traffic is 90% useless (youexec.com)
324 points by somid3 20 hours ago | hide | 237 comments
24. Noise Protocol Framework (noiseprotocol.org)
209 points by cryptoshere 21 hours ago | hide | 46 comments
25. What Happens to OO When Processors Are Free? (2015) (metaobject.com)
150 points by mpweiher 17 hours ago | hide | 114 comments
26. An Explainer on Unix’s Most Notorious Code Comment (thenewstack.io)
131 points by inopinatus 15 hours ago | hide | 28 comments
27. Amazon’s Glacier secret: BDXL (2014) (storagemojo.com)
174 points by another 20 hours ago | hide | 61 comments
28. AngularJS Bootstrap Spring – Startup App (github.com)
31 points by leggettr 13 hours ago | hide | 9 comments
29. A Peek at GNU Radio’s Buffer Architecture (gnuradio.org)
110 points by ptr 15 hours ago | hide | 14 comments
30. Game Theory Reveals the Future of Deep Learning (medium.com)
147 points by curiousgal 18 hours ago | hide | 59 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: