Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
Inside a low-budget consumer hardware espionage implant
(
cking.ch
)
164 points
by
patadune
3 hours ago
|
hide
|
27 comments
2.
The cargo cult of versioning
(
akkartik.name
)
64 points
by
chauhankiran
3 hours ago
|
hide
|
43 comments
3.
A penetration tester’s guide to sub-domain enumeration
(
appsecco.com
)
37 points
by
adamnemecek
2 hours ago
|
hide
|
discuss
4.
Experiment with particles using WebAssembly and WebGL
(
maierfelix.github.io
)
73 points
by
Schampu
4 hours ago
|
hide
|
26 comments
5.
The math and algorithms behind a search library
(
kabir.ml
)
40 points
by
kbr
3 hours ago
|
hide
|
5 comments
6.
Gaussian Distributions Are Soap Bubbles
(
inference.vc
)
89 points
by
lebek
5 hours ago
|
hide
|
21 comments
7.
Modeling Science as a Directed Graph
(
benchling.engineering
)
31 points
by
ftong
2 hours ago
|
hide
|
2 comments
8.
Snap’s Rise and Fall: How a Big, Splashy IPO Prompted the Doubters to Keep Mum
(
wsj.com
)
26 points
by
JumpCrisscross
3 hours ago
|
hide
|
15 comments
9.
OVH outage explained
(
ovh.net
)
200 points
by
pmontra
9 hours ago
|
hide
|
55 comments
10.
YCSB Benchmark Results for YugaByte and Apache Cassandra
(
yugabyte.com
)
10 points
by
tech_tool
1 hour ago
|
hide
|
6 comments
11.
A Very Long, Super-Nerdy NBA Podcast Is Making Money
(
bloomberg.com
)
65 points
by
pmcpinto
6 hours ago
|
hide
|
36 comments
12.
Pervasive Monitoring Is an Attack (2014)
(
ietf.org
)
31 points
by
pmoriarty
4 hours ago
|
hide
|
2 comments
13.
Creating a presentation by hand using calligraphy
(
nibrahim.net.in
)
65 points
by
baijum
5 hours ago
|
hide
|
14 comments
14.
Alibaba hits nearly $18B in ‘Singles Day’ orders in 12 hours
(
nytimes.com
)
172 points
by
smaili
13 hours ago
|
hide
|
126 comments
15.
W.E.B. Du Bois on the beauty of sorrow songs (1903)
(
laphamsquarterly.org
)
19 points
by
tintinnabula
2 hours ago
|
hide
|
1 comment
16.
Software architecture is failing
(
alexhudson.com
)
94 points
by
turingbook
2 hours ago
|
hide
|
63 comments
17.
Biomimicry: How Designers Are Learning from the Natural World
(
99percentinvisible.org
)
59 points
by
yuvals
8 hours ago
|
hide
|
7 comments
18.
Optimal placement of log printing statements under specified overhead threshold
(
acolyer.org
)
49 points
by
mpweiher
8 hours ago
|
hide
|
discuss
19.
RSS: there's nothing better
(
davidyat.es
)
481 points
by
dyates
9 hours ago
|
hide
|
218 comments
20.
STARKs, Part I: Proofs with Polynomials
(
vitalik.ca
)
51 points
by
kobigurk
7 hours ago
|
hide
|
4 comments
21.
Popular Machine Learning algorithms
(
medium.com
)
17 points
by
joydeep314
1 hour ago
|
hide
|
5 comments
22.
Capsule Networks Explained
(
kndrck.co
)
75 points
by
kendrick__
10 hours ago
|
hide
|
6 comments
23.
Crypto Mining Scripts Explained
(
mycryptopedia.com
)
31 points
by
bisade
7 hours ago
|
hide
|
7 comments
24.
A Memorial in Line Segment Cipher from Peru (1604)
(
fc2.com
)
6 points
by
benbreen
2 hours ago
|
hide
|
discuss
25.
Julia: A Modern Language for Modern ML
(
infoq.com
)
59 points
by
pjmlp
4 hours ago
|
hide
|
6 comments
26.
Is it time to stop trusting Google search?
(
theverge.com
)
204 points
by
bauta-steen
8 hours ago
|
hide
|
124 comments
27.
Deep Learning notebook walkthrough in Clojure
(
github.com
)
38 points
by
gigasquid
5 hours ago
|
hide
|
1 comment
28.
10 years of love for Emacs undone by a week of VSCode
(
swizec.com
)
7 points
by
Swizec
1 hour ago
|
hide
|
discuss
29.
Plain Functional Programming by Martin Odersky [video]
(
youtube.com
)
72 points
by
cfarre
6 hours ago
|
hide
|
19 comments
30.
“We have obtained fully functional JTAG for Intel CSME via USB DCI”
(
twitter.com
)
681 points
by
cryogenic_soul
1 day ago
|
hide
|
370 comments
More
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
DMCA
|
Apply to YC
|
Contact
Search: