Hacker News new | comments | show | ask | jobs | submit login
1. How Shor's Algorithm works (2007) (scottaaronson.com)
153 points by monort 4 hours ago | hide | 13 comments
2. Why the feds took down one of Bitcoin’s largest exchanges (theverge.com)
5 points by SirLJ 9 minutes ago | hide | discuss
3. Going down the rabbit hole with go-fuzz (mijailovic.net)
54 points by Metalnem 3 hours ago | hide | 5 comments
4. Millennials are keeping libraries alive (qz.com)
143 points by prostoalex 6 hours ago | hide | 103 comments
5. The Most Anthologized Poems of the Last 25 Years (lithub.com)
20 points by bryanrasmussen 3 hours ago | hide | 1 comment
6. Manipulate Functions with the J Language (adamtornhill.com)
71 points by nephrenka 6 hours ago | hide | 8 comments
7. DuoCopter (research-drone.com)
78 points by based2 7 hours ago | hide | 17 comments
8. Visualizing the Math Behind Logistic Regression and Newton's Method (thelaziestprogrammer.com)
106 points by seanharr11 9 hours ago | hide | 30 comments
9. A binary coder for Swift (mikeash.com)
85 points by chmaynard 9 hours ago | hide | 18 comments
10. Targeting HTTP's Hidden Attack-Surface (portswigger.net)
117 points by skybrian 9 hours ago | hide | 8 comments
11. Jeff Bezos Escapes Scrutiny from His Own Paper–and Its Rivals (fair.org)
39 points by blackbagboys 4 hours ago | hide | 17 comments
12. Robust Physical-World Attacks on Machine Learning Models (arxiv.org)
4 points by earlenceferns 1 hour ago | hide | discuss
13. The case against Kotlin (medium.com)
60 points by PleaseHelpMe 3 hours ago | hide | 31 comments
14. How to present a GitHub project for your resume (2016) (thehftguy.com)
164 points by user5994461 8 hours ago | hide | 65 comments
15. Rendering beautiful math images with Python (github.com)
68 points by 68c12c16 12 hours ago | hide | 2 comments
16. Handbook of Biological Statistics (2014) (biostathandbook.com)
42 points by Tomte 10 hours ago | hide | 1 comment
17. Griffin: Guarding Control Flows Using Intel Processor Trace [pdf] (microsoft.com)
18 points by 68c12c16 5 hours ago | hide | 1 comment
18. Apple Removes Apps from China Store That Help Internet Users Evade Censorship (nytimes.com)
350 points by mcone 9 hours ago | hide | 350 comments
19. Timeline of the ChainCoin Scam – Massive Cryptocurrency Pump and Dump Scheme (storeofvalue.github.io)
17 points by notlikethis1994 5 hours ago | hide | 5 comments
20. Caught in the net (theanarchistlibrary.org)
35 points by ismiseted 10 hours ago | hide | 3 comments
21. Minimega – A distributed VM management tool (minimega.org)
49 points by voxadam 12 hours ago | hide | 11 comments
22. Certificate Transparency: Hacking web applications before they are installed (golem.de)
41 points by Tomte 10 hours ago | hide | 10 comments
23. Exactly-once or not, atomic broadcast is still impossible in Kafka (the-paper-trail.org)
55 points by 68c12c16 5 hours ago | hide | 19 comments
24. 'Using Emacs' Series (cestlaz.github.io)
200 points by rafiei 17 hours ago | hide | 90 comments
25. Programming in the 1960s (slideshare.net)
63 points by nickpsecurity 6 hours ago | hide | 16 comments
26. Google News Archive (news.google.com)
66 points by lbeziaud 7 hours ago | hide | 4 comments
27. Robot cracks open safe live on Def Con's stage (bbc.com)
278 points by SirLJ 19 hours ago | hide | 93 comments
28. Pigs are smart and sensitive, yet we continue to justify killing them for food (aeon.co)
5 points by doener 57 minutes ago | hide | discuss
29. P&G Cuts More Than $100M in ‘Largely Ineffective’ Digital Ads (wsj.com)
299 points by kawera 17 hours ago | hide | 229 comments
30. Devirtualization in LLVM and Clang (llvm.org)
44 points by jjuhl 10 hours ago | hide | 17 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: