Hacker News new | comments | show | ask | jobs | submit login
1. Inside a low-budget consumer hardware espionage implant (cking.ch)
164 points by patadune 3 hours ago | hide | 27 comments
2. The cargo cult of versioning (akkartik.name)
64 points by chauhankiran 3 hours ago | hide | 43 comments
3. A penetration tester’s guide to sub-domain enumeration (appsecco.com)
37 points by adamnemecek 2 hours ago | hide | discuss
4. Experiment with particles using WebAssembly and WebGL (maierfelix.github.io)
73 points by Schampu 4 hours ago | hide | 26 comments
5. The math and algorithms behind a search library (kabir.ml)
40 points by kbr 3 hours ago | hide | 5 comments
6. Gaussian Distributions Are Soap Bubbles (inference.vc)
89 points by lebek 5 hours ago | hide | 21 comments
7. Modeling Science as a Directed Graph (benchling.engineering)
31 points by ftong 2 hours ago | hide | 2 comments
8. Snap’s Rise and Fall: How a Big, Splashy IPO Prompted the Doubters to Keep Mum (wsj.com)
26 points by JumpCrisscross 3 hours ago | hide | 15 comments
9. OVH outage explained (ovh.net)
200 points by pmontra 9 hours ago | hide | 55 comments
10. YCSB Benchmark Results for YugaByte and Apache Cassandra (yugabyte.com)
10 points by tech_tool 1 hour ago | hide | 6 comments
11. A Very Long, Super-Nerdy NBA Podcast Is Making Money (bloomberg.com)
65 points by pmcpinto 6 hours ago | hide | 36 comments
12. Pervasive Monitoring Is an Attack (2014) (ietf.org)
31 points by pmoriarty 4 hours ago | hide | 2 comments
13. Creating a presentation by hand using calligraphy (nibrahim.net.in)
65 points by baijum 5 hours ago | hide | 14 comments
14. Alibaba hits nearly $18B in ‘Singles Day’ orders in 12 hours (nytimes.com)
172 points by smaili 13 hours ago | hide | 126 comments
15. W.E.B. Du Bois on the beauty of sorrow songs (1903) (laphamsquarterly.org)
19 points by tintinnabula 2 hours ago | hide | 1 comment
16. Software architecture is failing (alexhudson.com)
94 points by turingbook 2 hours ago | hide | 63 comments
17. Biomimicry: How Designers Are Learning from the Natural World (99percentinvisible.org)
59 points by yuvals 8 hours ago | hide | 7 comments
18. Optimal placement of log printing statements under specified overhead threshold (acolyer.org)
49 points by mpweiher 8 hours ago | hide | discuss
19. RSS: there's nothing better (davidyat.es)
481 points by dyates 9 hours ago | hide | 218 comments
20. STARKs, Part I: Proofs with Polynomials (vitalik.ca)
51 points by kobigurk 7 hours ago | hide | 4 comments
21. Popular Machine Learning algorithms (medium.com)
17 points by joydeep314 1 hour ago | hide | 5 comments
22. Capsule Networks Explained (kndrck.co)
75 points by kendrick__ 10 hours ago | hide | 6 comments
23. Crypto Mining Scripts Explained (mycryptopedia.com)
31 points by bisade 7 hours ago | hide | 7 comments
24. A Memorial in Line Segment Cipher from Peru (1604) (fc2.com)
6 points by benbreen 2 hours ago | hide | discuss
25. Julia: A Modern Language for Modern ML (infoq.com)
59 points by pjmlp 4 hours ago | hide | 6 comments
26. Is it time to stop trusting Google search? (theverge.com)
204 points by bauta-steen 8 hours ago | hide | 124 comments
27. Deep Learning notebook walkthrough in Clojure (github.com)
38 points by gigasquid 5 hours ago | hide | 1 comment
28. 10 years of love for Emacs undone by a week of VSCode (swizec.com)
7 points by Swizec 1 hour ago | hide | discuss
29. Plain Functional Programming by Martin Odersky [video] (youtube.com)
72 points by cfarre 6 hours ago | hide | 19 comments
30. “We have obtained fully functional JTAG for Intel CSME via USB DCI” (twitter.com)
681 points by cryogenic_soul 1 day ago | hide | 370 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: