Hacker News new | comments | show | ask | jobs | submit login
1. Moneyball teams (bg-blog.com)
195 points by bdg 3 hours ago | hide | 82 comments
2. The licensing program for MP3-related patents has been terminated (fraunhofer.de)
30 points by petercooper 32 minutes ago | hide | 12 comments
3. Ask HN: Who is hiring? (May 2017)
304 points by whoishiring 4 hours ago | hide | 415 comments
4. Asynchronous Programming in Python: Asyncio (djangostars.com)
42 points by submeta 1 hour ago | hide | 1 comment
5. Getting Started with Headless Chrome (developers.google.com)
143 points by uptown 3 hours ago | hide | 42 comments
6. Esoteric programming paradigms (ybrikman.com)
225 points by SlyShy 5 hours ago | hide | 65 comments
7. Are we underestimating the vulnerability of bridges? (stanford.edu)
14 points by smb06 46 minutes ago | hide | 6 comments
8. Programming as a Way of Thinking (scientificamerican.com)
165 points by pmcpinto 7 hours ago | hide | 77 comments
9. The fifty shades of Latin (riowang.blogspot.com)
3 points by drjohnson 9 minutes ago | hide | discuss
10. Y Combinator When No One Cared (foundersatwork.posthaven.com)
223 points by tomhoward 8 hours ago | hide | 64 comments
11. Why Walking Helps Us Think (2014) (newyorker.com)
320 points by bootload 14 hours ago | hide | 99 comments
12. My Cousin Lenny: Remembering Leonard Bernstein (thesmartset.com)
5 points by tintinnabula 1 hour ago | hide | discuss
13. FuncShell – A Haskell-based alternative to awk (github.com)
101 points by _iostreamer_ 8 hours ago | hide | 29 comments
14. John Paulson’s Fall from Hedge Fund Stardom (nytimes.com)
47 points by chollida1 6 hours ago | hide | 46 comments
15. Information Technology and Moral Values (2012) (stanford.edu)
33 points by lainon 5 hours ago | hide | 2 comments
16. IBM and Red Hat to Vote “No” on Java Modules (Jigsaw) (infoq.com)
44 points by taylodl 1 hour ago | hide | 16 comments
17. Kotlin doesn’t need an LLVM backend (2016) (plan99.net)
56 points by bmaupin 3 hours ago | hide | 70 comments
18. Intel platforms from 2008 onwards have a remotely exploitable security hole (semiaccurate.com)
285 points by theSoenke 6 hours ago | hide | 121 comments
19. Loyalty in Online Communities [pdf] (stanford.edu)
31 points by lainon 6 hours ago | hide | 3 comments
20. Coding the Matrix: Linear Algebra Through Computer Science Applications (codingthematrix.com)
59 points by jmstfv 9 hours ago | hide | 5 comments
21. Root Zone Database (iana.org)
52 points by varunvkrishnan 7 hours ago | hide | 21 comments
22. SpaceX Falcon 9 first stage has landed at LZ-1 [video] (youtube.com)
242 points by romanhotsiy 8 hours ago | hide | 81 comments
23. Bridj shuts down (bridj.com)
42 points by seibelj 6 hours ago | hide | 38 comments
24. Sent to Prison by a Software Program’s Secret Algorithms (nytimes.com)
46 points by gscott 3 hours ago | hide | 15 comments
25. I2P-Bote – Email plugin for the I2P network that uses a distributed hash table (i2pbote.xyz)
67 points by jerheinze 11 hours ago | hide | 19 comments
26. Rhubarb: The role of Edinburgh in its cultivation and development [pdf] (rcpe.ac.uk)
32 points by DanBC 7 hours ago | hide | 11 comments
27. PfSense 2.5 and AES-NI (netgate.com)
39 points by sashk 2 hours ago | hide | 43 comments
28. A Thinking Person's Guide to the Latest Bitcoin Drama (hackingdistributed.com)
38 points by deegles 2 hours ago | hide | 36 comments
29. Show HN: Sorting Two Metric Tons of Lego (jacquesmattheij.com)
1146 points by jacquesm 2 days ago | hide | 205 comments
30. Flexport is hiring a Chief of Staff (flexport.com)
4 hours ago | hide
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: