Hacker News new | comments | show | ask | jobs | submit login
1. TLDR for Man Pages (tldr.sh)
20 points by akras14 51 minutes ago | hide | 5 comments
2. Carp, a compiled Lisp with type inference and a borrow checker (veitheller.de)
122 points by eriksvedang 5 hours ago | hide | 43 comments
3. LIL, the Little Implementation Language (1974) (ultimate.com)
6 points by akkartik 34 minutes ago | hide | discuss
4. My unusual hobby (stephanboyer.com)
566 points by curryhoward 14 hours ago | hide | 121 comments
5. VNC, RDP and SSH Over HTML5 (apache.org)
73 points by WhyNotHugo 3 hours ago | hide | 15 comments
6. Half-Life and Team Fortress Networking (gamasutra.com)
116 points by setra 9 hours ago | hide | 25 comments
7. Apple’s Secure Enclave Processor (SEP) Firmware Decrypted (hackaday.com)
107 points by wonderous 3 hours ago | hide | 14 comments
8. Matcha: Mobile apps in Go (gomatcha.io)
62 points by ingve 6 hours ago | hide | 6 comments
9. Apple Krackers Guide (1985) [pdf] (uni-stuttgart.de)
60 points by Tomte 10 hours ago | hide | 2 comments
10. Drinking 3-4 Cups of Coffee Is “More Likely to Benefit Health Than to Harm It” (sciencedaily.com)
32 points by Exo_Tartarus 2 hours ago | hide | 19 comments
11. Guide to avoiding vulnerabilities in programming languages [pdf] (open-std.org)
61 points by ingve 12 hours ago | hide | 4 comments
12. Simpson's Paradox and the Hot Hand in Basketball (1995) (fermatslibrary.com)
26 points by micaeloliveira 8 hours ago | hide | 14 comments
13. Linux pioneer Munich confirms switch to Windows 10 (techrepublic.com)
13 points by Sytten 1 hour ago | hide | 8 comments
14. Cloudflare Reports Massive Slowdown in Network Level DDoS Attacks (cloudflare.com)
48 points by IcyApril 4 hours ago | hide | 6 comments
15. Reprogramming a $13 consumer wifi-enabled outlet (rluckom.github.io)
117 points by zipfle 8 hours ago | hide | 21 comments
16. Inside the Revolution at Etsy (nytimes.com)
89 points by e15ctr0n 11 hours ago | hide | 51 comments
17. A minimalist guide to tmux (medium.com)
171 points by peterxjang 10 hours ago | hide | 65 comments
18. Security Guidelines for Congressional Campaigns (techsolidarity.org)
87 points by stablemap 9 hours ago | hide | 70 comments
19. Practical Unix Manuals: mdoc (bsd.lv)
122 points by beefhash 15 hours ago | hide | 22 comments
20. What Happens If China Makes First Contact? (theatlantic.com)
4 points by angli 1 hour ago | hide | 1 comment
21. Terrain rendering in fewer than 20 lines of code (github.com)
716 points by blaze33 1 day ago | hide | 86 comments
22. Syntia: Synthesizing the Semantics of Obfuscated Code (usenix.org)
18 points by ingve 12 hours ago | hide | discuss
23. New in Datasette: filters, foreign keys and search (simonwillison.net)
30 points by simonw 7 hours ago | hide | 2 comments
24. How does one get the system to actually use the IPv6 Temporary Addresses? (microsoft.com)
54 points by the8472 8 hours ago | hide | 29 comments
25. Linked List Problems (2002) [pdf] (stanford.edu)
213 points by starschema 23 hours ago | hide | 88 comments
26. Ciao, Chrome: Firefox Quantum Is the Browser Built for 2017 (wired.com)
375 points by bpierre 12 hours ago | hide | 255 comments
27. Driving for Uber and Lyft (mrmoneymustache.com)
174 points by sus_007 5 hours ago | hide | 110 comments
28. Ask HN: CS papers for software architecture and design?
423 points by avrmav 17 hours ago | hide | 78 comments
29. “I fell down a bit of a ruins research rabbit-hole” (twitter.com)
508 points by caio1982 1 day ago | hide | 40 comments
30. A Callout: Parts for an Iron Lung (hackaday.com)
63 points by JJLongusa 8 hours ago | hide | 23 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: