Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
Reverse engineering guide for beginners: Methodology and tools
(
0x00sec.org
)
536 points
by
ingve
11 hours ago
|
hide
|
51 comments
2.
Voc: a physical model of the vocal tract, written in ANSI C
(
pbat.ch
)
41 points
by
adamnemecek
2 hours ago
|
hide
|
10 comments
3.
The Design and Use of QuickCheck
(
begriffs.com
)
79 points
by
begriffs
5 hours ago
|
hide
|
9 comments
4.
Startup School 18: How to Raise Money and How to Succeed Long-Term [video]
(
startupschool.org
)
72 points
by
Naushad
5 hours ago
|
hide
|
2 comments
5.
Lessons I’ve Learned from Three Million App Downloads
(
jordansmith.io
)
32 points
by
jordansmithnz
2 hours ago
|
hide
|
5 comments
6.
Eye-witness stories from Chernobyl
(
ironedcurtains.com
)
27 points
by
vkb
3 hours ago
|
hide
|
1 comment
7.
Terraform Gotchas and How We Work Around Them
(
heap.engineering
)
119 points
by
kalmar
7 hours ago
|
hide
|
57 comments
8.
Z-order curve usage to decrease dimensionality to 1
(
ssahinkoc.blogspot.com
)
11 points
by
delidumrul
1 hour ago
|
hide
|
2 comments
9.
Remembering the Murder You Didn't Commit
(
newyorker.com
)
53 points
by
danso
4 hours ago
|
hide
|
5 comments
10.
Dismantling a Million Tons of North Sea Oil Rigs
(
nytimes.com
)
69 points
by
tysone
6 hours ago
|
hide
|
54 comments
11.
16 Years with IPv6
(
teamarin.net
)
44 points
by
okket
5 hours ago
|
hide
|
21 comments
12.
Chess.com stopped working on 32bit iPads because 2^31 games have been played
(
chess.com
)
496 points
by
NewGier
7 hours ago
|
hide
|
190 comments
13.
History of Computing at Bell Labs (1997)
(
swtch.com
)
57 points
by
mpweiher
6 hours ago
|
hide
|
2 comments
14.
The Dangerous Irrelevance of String Theory
(
columbia.edu
)
11 points
by
seycombi
3 hours ago
|
hide
|
3 comments
15.
Wartime Spies Who Used Knitting as an Espionage Tool
(
atlasobscura.com
)
35 points
by
artsandsci
5 hours ago
|
hide
|
8 comments
16.
A Lizard Lost at Sea Makes Its Return
(
newyorker.com
)
20 points
by
anthotny
4 hours ago
|
hide
|
1 comment
17.
The Coming War on General Computation (2011)
(
opentranscripts.org
)
55 points
by
jacquesm
3 hours ago
|
hide
|
2 comments
18.
Show HN: Keygen – A dead-simple software licensing API built for developers
(
keygen.sh
)
98 points
by
ezekg
9 hours ago
|
hide
|
29 comments
19.
#c0ffee is the color
(
surge.sh
)
670 points
by
pavel_lishin
11 hours ago
|
hide
|
109 comments
20.
The koshering of the Oreo cookie (2008)
(
cornell.edu
)
34 points
by
Mz
5 hours ago
|
hide
|
37 comments
21.
Tagsistant: semantic filesystem for Linux
(
tagsistant.net
)
88 points
by
CarolineW
11 hours ago
|
hide
|
42 comments
22.
Benchmarking CNTK on Keras: Is It Better at Deep Learning Than TensorFlow?
(
minimaxir.com
)
98 points
by
minimaxir
10 hours ago
|
hide
|
25 comments
23.
Battles and Dynasties at Lincoln Castle
(
blogs.bl.uk
)
7 points
by
pepys
2 hours ago
|
hide
|
discuss
24.
'Crash Override': Malware That Took Down a Power Grid
(
wired.com
)
45 points
by
cwal37
8 hours ago
|
hide
|
17 comments
25.
Some Thoughts on Our Business (2011)
(
lettersofnote.com
)
33 points
by
CalChris
7 hours ago
|
hide
|
2 comments
26.
Canada's Tech Firms Capitalize On Immigration Anxiety
(
npr.org
)
109 points
by
agronaut
7 hours ago
|
hide
|
188 comments
27.
Grammar Puss: The fallacies of the language mavens (1994)
(
newrepublic.com
)
24 points
by
Tomte
6 hours ago
|
hide
|
14 comments
28.
Show HN: Kooba, an interactive graph for finding new books
(
jake.run
)
92 points
by
cloudbeary
10 hours ago
|
hide
|
36 comments
29.
Can Neural Networks Crack Sudoku?
(
github.com
)
123 points
by
kyubyong
13 hours ago
|
hide
|
90 comments
30.
Loop Exits and Structured Programming: Reopening the Debate (1995) [pdf]
(
stanford.edu
)
20 points
by
tjalfi
4 hours ago
|
hide
|
32 comments
More
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: