Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
Inside a low budget consumer hardware espionage implant
(
cking.ch
)
121 points
by
patadune
2 hours ago
|
hide
|
17 comments
2.
The cargo cult of versioning
(
akkartik.name
)
38 points
by
chauhankiran
2 hours ago
|
hide
|
15 comments
3.
Modeling Science as a Directed Graph
(
benchling.engineering
)
21 points
by
ftong
1 hour ago
|
hide
|
1 comment
4.
Software architecture is failing
(
alexhudson.com
)
61 points
by
turingbook
1 hour ago
|
hide
|
36 comments
5.
Gaussian Distributions Are Soap Bubbles
(
inference.vc
)
80 points
by
lebek
4 hours ago
|
hide
|
16 comments
6.
Experiment with particles using WebAssembly and WebGL
(
maierfelix.github.io
)
57 points
by
Schampu
4 hours ago
|
hide
|
21 comments
7.
Snap’s Rise and Fall: How a Big, Splashy IPO Prompted the Doubters to Keep Mum
(
wsj.com
)
17 points
by
JumpCrisscross
2 hours ago
|
hide
|
2 comments
8.
The math and algorithms behind a search library
(
kabir.ml
)
26 points
by
kbr
2 hours ago
|
hide
|
1 comment
9.
OVH outage explained
(
ovh.net
)
191 points
by
pmontra
8 hours ago
|
hide
|
49 comments
10.
A Very Long, Super-Nerdy NBA Podcast Is Making Money
(
bloomberg.com
)
59 points
by
pmcpinto
5 hours ago
|
hide
|
31 comments
11.
Pervasive Monitoring Is an Attack (2014)
(
ietf.org
)
21 points
by
pmoriarty
3 hours ago
|
hide
|
2 comments
12.
Creating a presentation by hand using calligraphy
(
nibrahim.net.in
)
56 points
by
baijum
4 hours ago
|
hide
|
12 comments
13.
Alibaba hits nearly $18B in ‘Singles Day’ orders in 12 hours
(
nytimes.com
)
167 points
by
smaili
12 hours ago
|
hide
|
119 comments
14.
YCSB Benchmark Results for YugaByte and Apache Cassandra
(
yugabyte.com
)
4 points
by
tech_tool
57 minutes ago
|
hide
|
1 comment
15.
Mobile Security Best Practices
(
gotowebsecurity.com
)
5 points
by
nirmalkant
59 minutes ago
|
hide
|
discuss
16.
W.E.B. Du Bois on the beauty of sorrow songs (1903)
(
laphamsquarterly.org
)
11 points
by
tintinnabula
1 hour ago
|
hide
|
discuss
17.
RSS: there's nothing better
(
davidyat.es
)
464 points
by
dyates
8 hours ago
|
hide
|
213 comments
18.
Biomimicry: How Designers Are Learning from the Natural World
(
99percentinvisible.org
)
54 points
by
yuvals
7 hours ago
|
hide
|
7 comments
19.
Optimal placement of log printing statements under specified overhead threshold
(
acolyer.org
)
46 points
by
mpweiher
7 hours ago
|
hide
|
discuss
20.
STARKs, Part I: Proofs with Polynomials
(
vitalik.ca
)
41 points
by
kobigurk
6 hours ago
|
hide
|
4 comments
21.
A penetration tester’s guide to sub-domain enumeration
(
appsecco.com
)
21 points
by
adamnemecek
1 hour ago
|
hide
|
discuss
22.
Capsule Networks Explained
(
kndrck.co
)
71 points
by
kendrick__
9 hours ago
|
hide
|
4 comments
23.
Crypto Mining Scripts Explained
(
mycryptopedia.com
)
30 points
by
bisade
6 hours ago
|
hide
|
6 comments
24.
Popular Machine Learning algorithms
(
medium.com
)
8 points
by
joydeep314
49 minutes ago
|
hide
|
discuss
25.
Julia: A Modern Language for Modern ML
(
infoq.com
)
46 points
by
pjmlp
3 hours ago
|
hide
|
4 comments
26.
Is it time to stop trusting Google search?
(
theverge.com
)
188 points
by
bauta-steen
7 hours ago
|
hide
|
112 comments
27.
Plain Functional Programming by Martin Odersky [video]
(
youtube.com
)
64 points
by
cfarre
5 hours ago
|
hide
|
16 comments
28.
Deep Learning notebook walkthrough in Clojure
(
github.com
)
29 points
by
gigasquid
4 hours ago
|
hide
|
discuss
29.
Is Mark Zuckerberg Facebook's Last True Believer?
(
vanityfair.com
)
70 points
by
dodders
3 hours ago
|
hide
|
47 comments
30.
“We have obtained fully functional JTAG for Intel CSME via USB DCI”
(
twitter.com
)
673 points
by
cryogenic_soul
1 day ago
|
hide
|
368 comments
More
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: