Hacker News new | comments | show | ask | jobs | submit login
1. Reverse engineering guide for beginners: Methodology and tools (0x00sec.org)
536 points by ingve 11 hours ago | hide | 51 comments
2. Voc: a physical model of the vocal tract, written in ANSI C (pbat.ch)
41 points by adamnemecek 2 hours ago | hide | 10 comments
3. The Design and Use of QuickCheck (begriffs.com)
79 points by begriffs 5 hours ago | hide | 9 comments
4. Startup School 18: How to Raise Money and How to Succeed Long-Term [video] (startupschool.org)
72 points by Naushad 5 hours ago | hide | 2 comments
5. Lessons I’ve Learned from Three Million App Downloads (jordansmith.io)
32 points by jordansmithnz 2 hours ago | hide | 5 comments
6. Eye-witness stories from Chernobyl (ironedcurtains.com)
27 points by vkb 3 hours ago | hide | 1 comment
7. Terraform Gotchas and How We Work Around Them (heap.engineering)
119 points by kalmar 7 hours ago | hide | 57 comments
8. Z-order curve usage to decrease dimensionality to 1 (ssahinkoc.blogspot.com)
11 points by delidumrul 1 hour ago | hide | 2 comments
9. Remembering the Murder You Didn't Commit (newyorker.com)
53 points by danso 4 hours ago | hide | 5 comments
10. Dismantling a Million Tons of North Sea Oil Rigs (nytimes.com)
69 points by tysone 6 hours ago | hide | 54 comments
11. 16 Years with IPv6 (teamarin.net)
44 points by okket 5 hours ago | hide | 21 comments
12. Chess.com stopped working on 32bit iPads because 2^31 games have been played (chess.com)
496 points by NewGier 7 hours ago | hide | 190 comments
13. History of Computing at Bell Labs (1997) (swtch.com)
57 points by mpweiher 6 hours ago | hide | 2 comments
14. The Dangerous Irrelevance of String Theory (columbia.edu)
11 points by seycombi 3 hours ago | hide | 3 comments
15. Wartime Spies Who Used Knitting as an Espionage Tool (atlasobscura.com)
35 points by artsandsci 5 hours ago | hide | 8 comments
16. A Lizard Lost at Sea Makes Its Return (newyorker.com)
20 points by anthotny 4 hours ago | hide | 1 comment
17. The Coming War on General Computation (2011) (opentranscripts.org)
55 points by jacquesm 3 hours ago | hide | 2 comments
18. Show HN: Keygen – A dead-simple software licensing API built for developers (keygen.sh)
98 points by ezekg 9 hours ago | hide | 29 comments
19. #c0ffee is the color (surge.sh)
670 points by pavel_lishin 11 hours ago | hide | 109 comments
20. The koshering of the Oreo cookie (2008) (cornell.edu)
34 points by Mz 5 hours ago | hide | 37 comments
21. Tagsistant: semantic filesystem for Linux (tagsistant.net)
88 points by CarolineW 11 hours ago | hide | 42 comments
22. Benchmarking CNTK on Keras: Is It Better at Deep Learning Than TensorFlow? (minimaxir.com)
98 points by minimaxir 10 hours ago | hide | 25 comments
23. Battles and Dynasties at Lincoln Castle (blogs.bl.uk)
7 points by pepys 2 hours ago | hide | discuss
24. 'Crash Override': Malware That Took Down a Power Grid (wired.com)
45 points by cwal37 8 hours ago | hide | 17 comments
25. Some Thoughts on Our Business (2011) (lettersofnote.com)
33 points by CalChris 7 hours ago | hide | 2 comments
26. Canada's Tech Firms Capitalize On Immigration Anxiety (npr.org)
109 points by agronaut 7 hours ago | hide | 188 comments
27. Grammar Puss: The fallacies of the language mavens (1994) (newrepublic.com)
24 points by Tomte 6 hours ago | hide | 14 comments
28. Show HN: Kooba, an interactive graph for finding new books (jake.run)
92 points by cloudbeary 10 hours ago | hide | 36 comments
29. Can Neural Networks Crack Sudoku? (github.com)
123 points by kyubyong 13 hours ago | hide | 90 comments
30. Loop Exits and Structured Programming: Reopening the Debate (1995) [pdf] (stanford.edu)
20 points by tjalfi 4 hours ago | hide | 32 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: