Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
Moneyball teams
(
bg-blog.com
)
195 points
by
bdg
3 hours ago
|
hide
|
82 comments
2.
The licensing program for MP3-related patents has been terminated
(
fraunhofer.de
)
30 points
by
petercooper
32 minutes ago
|
hide
|
12 comments
3.
Ask HN: Who is hiring? (May 2017)
304 points
by
whoishiring
4 hours ago
|
hide
|
415 comments
4.
Asynchronous Programming in Python: Asyncio
(
djangostars.com
)
42 points
by
submeta
1 hour ago
|
hide
|
1 comment
5.
Getting Started with Headless Chrome
(
developers.google.com
)
143 points
by
uptown
3 hours ago
|
hide
|
42 comments
6.
Esoteric programming paradigms
(
ybrikman.com
)
225 points
by
SlyShy
5 hours ago
|
hide
|
65 comments
7.
Are we underestimating the vulnerability of bridges?
(
stanford.edu
)
14 points
by
smb06
46 minutes ago
|
hide
|
6 comments
8.
Programming as a Way of Thinking
(
scientificamerican.com
)
165 points
by
pmcpinto
7 hours ago
|
hide
|
77 comments
9.
The fifty shades of Latin
(
riowang.blogspot.com
)
3 points
by
drjohnson
9 minutes ago
|
hide
|
discuss
10.
Y Combinator When No One Cared
(
foundersatwork.posthaven.com
)
223 points
by
tomhoward
8 hours ago
|
hide
|
64 comments
11.
Why Walking Helps Us Think (2014)
(
newyorker.com
)
320 points
by
bootload
14 hours ago
|
hide
|
99 comments
12.
My Cousin Lenny: Remembering Leonard Bernstein
(
thesmartset.com
)
5 points
by
tintinnabula
1 hour ago
|
hide
|
discuss
13.
FuncShell – A Haskell-based alternative to awk
(
github.com
)
101 points
by
_iostreamer_
8 hours ago
|
hide
|
29 comments
14.
John Paulson’s Fall from Hedge Fund Stardom
(
nytimes.com
)
47 points
by
chollida1
6 hours ago
|
hide
|
46 comments
15.
Information Technology and Moral Values (2012)
(
stanford.edu
)
33 points
by
lainon
5 hours ago
|
hide
|
2 comments
16.
IBM and Red Hat to Vote “No” on Java Modules (Jigsaw)
(
infoq.com
)
44 points
by
taylodl
1 hour ago
|
hide
|
16 comments
17.
Kotlin doesn’t need an LLVM backend (2016)
(
plan99.net
)
56 points
by
bmaupin
3 hours ago
|
hide
|
70 comments
18.
Intel platforms from 2008 onwards have a remotely exploitable security hole
(
semiaccurate.com
)
285 points
by
theSoenke
6 hours ago
|
hide
|
121 comments
19.
Loyalty in Online Communities [pdf]
(
stanford.edu
)
31 points
by
lainon
6 hours ago
|
hide
|
3 comments
20.
Coding the Matrix: Linear Algebra Through Computer Science Applications
(
codingthematrix.com
)
59 points
by
jmstfv
9 hours ago
|
hide
|
5 comments
21.
Root Zone Database
(
iana.org
)
52 points
by
varunvkrishnan
7 hours ago
|
hide
|
21 comments
22.
SpaceX Falcon 9 first stage has landed at LZ-1 [video]
(
youtube.com
)
242 points
by
romanhotsiy
8 hours ago
|
hide
|
81 comments
23.
Bridj shuts down
(
bridj.com
)
42 points
by
seibelj
6 hours ago
|
hide
|
38 comments
24.
Sent to Prison by a Software Program’s Secret Algorithms
(
nytimes.com
)
46 points
by
gscott
3 hours ago
|
hide
|
15 comments
25.
I2P-Bote – Email plugin for the I2P network that uses a distributed hash table
(
i2pbote.xyz
)
67 points
by
jerheinze
11 hours ago
|
hide
|
19 comments
26.
Rhubarb: The role of Edinburgh in its cultivation and development [pdf]
(
rcpe.ac.uk
)
32 points
by
DanBC
7 hours ago
|
hide
|
11 comments
27.
PfSense 2.5 and AES-NI
(
netgate.com
)
39 points
by
sashk
2 hours ago
|
hide
|
43 comments
28.
A Thinking Person's Guide to the Latest Bitcoin Drama
(
hackingdistributed.com
)
38 points
by
deegles
2 hours ago
|
hide
|
36 comments
29.
Show HN: Sorting Two Metric Tons of Lego
(
jacquesmattheij.com
)
1146 points
by
jacquesm
2 days ago
|
hide
|
205 comments
30.
Flexport is hiring a Chief of Staff
(
flexport.com
)
4 hours ago
|
hide
More
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: