Hacker News new | comments | show | ask | jobs | submit login
1. Inside a low budget consumer hardware espionage implant (cking.ch)
121 points by patadune 2 hours ago | hide | 17 comments
2. The cargo cult of versioning (akkartik.name)
38 points by chauhankiran 2 hours ago | hide | 15 comments
3. Modeling Science as a Directed Graph (benchling.engineering)
21 points by ftong 1 hour ago | hide | 1 comment
4. Software architecture is failing (alexhudson.com)
61 points by turingbook 1 hour ago | hide | 36 comments
5. Gaussian Distributions Are Soap Bubbles (inference.vc)
80 points by lebek 4 hours ago | hide | 16 comments
6. Experiment with particles using WebAssembly and WebGL (maierfelix.github.io)
57 points by Schampu 4 hours ago | hide | 21 comments
7. Snap’s Rise and Fall: How a Big, Splashy IPO Prompted the Doubters to Keep Mum (wsj.com)
17 points by JumpCrisscross 2 hours ago | hide | 2 comments
8. The math and algorithms behind a search library (kabir.ml)
26 points by kbr 2 hours ago | hide | 1 comment
9. OVH outage explained (ovh.net)
191 points by pmontra 8 hours ago | hide | 49 comments
10. A Very Long, Super-Nerdy NBA Podcast Is Making Money (bloomberg.com)
59 points by pmcpinto 5 hours ago | hide | 31 comments
11. Pervasive Monitoring Is an Attack (2014) (ietf.org)
21 points by pmoriarty 3 hours ago | hide | 2 comments
12. Creating a presentation by hand using calligraphy (nibrahim.net.in)
56 points by baijum 4 hours ago | hide | 12 comments
13. Alibaba hits nearly $18B in ‘Singles Day’ orders in 12 hours (nytimes.com)
167 points by smaili 12 hours ago | hide | 119 comments
14. YCSB Benchmark Results for YugaByte and Apache Cassandra (yugabyte.com)
4 points by tech_tool 57 minutes ago | hide | 1 comment
15. Mobile Security Best Practices (gotowebsecurity.com)
5 points by nirmalkant 59 minutes ago | hide | discuss
16. W.E.B. Du Bois on the beauty of sorrow songs (1903) (laphamsquarterly.org)
11 points by tintinnabula 1 hour ago | hide | discuss
17. RSS: there's nothing better (davidyat.es)
464 points by dyates 8 hours ago | hide | 213 comments
18. Biomimicry: How Designers Are Learning from the Natural World (99percentinvisible.org)
54 points by yuvals 7 hours ago | hide | 7 comments
19. Optimal placement of log printing statements under specified overhead threshold (acolyer.org)
46 points by mpweiher 7 hours ago | hide | discuss
20. STARKs, Part I: Proofs with Polynomials (vitalik.ca)
41 points by kobigurk 6 hours ago | hide | 4 comments
21. A penetration tester’s guide to sub-domain enumeration (appsecco.com)
21 points by adamnemecek 1 hour ago | hide | discuss
22. Capsule Networks Explained (kndrck.co)
71 points by kendrick__ 9 hours ago | hide | 4 comments
23. Crypto Mining Scripts Explained (mycryptopedia.com)
30 points by bisade 6 hours ago | hide | 6 comments
24. Popular Machine Learning algorithms (medium.com)
8 points by joydeep314 49 minutes ago | hide | discuss
25. Julia: A Modern Language for Modern ML (infoq.com)
46 points by pjmlp 3 hours ago | hide | 4 comments
26. Is it time to stop trusting Google search? (theverge.com)
188 points by bauta-steen 7 hours ago | hide | 112 comments
27. Plain Functional Programming by Martin Odersky [video] (youtube.com)
64 points by cfarre 5 hours ago | hide | 16 comments
28. Deep Learning notebook walkthrough in Clojure (github.com)
29 points by gigasquid 4 hours ago | hide | discuss
29. Is Mark Zuckerberg Facebook's Last True Believer? (vanityfair.com)
70 points by dodders 3 hours ago | hide | 47 comments
30. “We have obtained fully functional JTAG for Intel CSME via USB DCI” (twitter.com)
673 points by cryogenic_soul 1 day ago | hide | 368 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: