Hacker News new | comments | show | ask | jobs | submit login
1. Power Prices Go Negative in Germany, a Positive for Energy Users (nytimes.com)
144 points by kwindla 3 hours ago | hide | 83 comments
2. DARPA's “Unhackable” Computer (eetimes.com)
17 points by deepnotderp 45 minutes ago | hide | 10 comments
3. ESP 8266 Wi-Fi Repeater with Mesh Networking (github.com)
259 points by rcarmo 5 hours ago | hide | 113 comments
4. Not Ready for Takeoff: Face Scans at Airport Departure Gates (airportfacescans.com)
71 points by driverdan 3 hours ago | hide | 52 comments
5. I amplified my home's Wi-Fi with aluminum foil (jiffchat.com)
83 points by niwde 4 hours ago | hide | 34 comments
6. Long-Term Clean Energy Optimism, Short-Term Caution (bnef.com)
18 points by jseliger 2 hours ago | hide | discuss
7. How I learned to program (danluu.com)
22 points by deafcalculus 2 hours ago | hide | 3 comments
8. A Dark Room: From Sabbatical Year to $800,000 (failory.com)
134 points by nicoserdeir 3 hours ago | hide | 110 comments
9. Remove my password from lists so hackers won't be able to hack me (github.com)
179 points by dEnigma 3 hours ago | hide | 36 comments
10. The All American Aldi (theawl.com)
15 points by briandear 2 hours ago | hide | 24 comments
11. Reviving the Apple 410 Color Plotter (nycresistor.com)
196 points by Ivoah 11 hours ago | hide | 11 comments
12. The state of netbooting Raspberry Pis (alexellis.io)
77 points by alexellisuk 8 hours ago | hide | 21 comments
13. Shanghai sets population at 25M (theguardian.com)
164 points by lnguyen 13 hours ago | hide | 183 comments
14. The Origin of CAR and CDR in Lisp (2005) (iwriteiam.nl)
55 points by tosh 6 hours ago | hide | 44 comments
15. Sorting functions implemented in C as std qsort() format (github.com)
6 points by adembudak 2 hours ago | hide | discuss
16. A Practical Guide to Correctly Troubleshooting with Traceroute (2009) [pdf] (nanog.org)
113 points by kercker 12 hours ago | hide | 7 comments
17. Ask HN: What's the best way to recover from burnout?
44 points by techexecadvice 2 hours ago | hide | 31 comments
18. Intel Memory Encryption Technologies [pdf] (intel.com)
18 points by ingve 3 hours ago | hide | 2 comments
19. Net Promoter Score Considered Harmful (usejournal.com)
146 points by arnklint 12 hours ago | hide | 76 comments
20. How to Emulate the “super” Keyword in C++ (fluentcpp.com)
6 points by joboccara 2 hours ago | hide | 1 comment
21. FreeBSD – a lesson in poor defaults (mrsk.me)
145 points by beefhash 6 hours ago | hide | 22 comments
22. Hardening C/C++ Programs – Executable-Space Protection and ASLR (productive-cpp.com)
94 points by mrich 12 hours ago | hide | 17 comments
23. Show HN: Convert your Google Slides to high-quality animated GIFs and tweet (talltweets.com)
58 points by amitagarwal 8 hours ago | hide | 19 comments
24. Guidance on Performing Retrospectives (craigkerstiens.com)
13 points by lfittl 3 hours ago | hide | 1 comment
25. WPaxos: a wide area network Paxos protocol (muratbuffalo.blogspot.com)
61 points by ingve 8 hours ago | hide | 9 comments
26. Show HN: Data Prism – Weekly newsletter about data science, ML, AI and analytics (dataprism.co)
122 points by angelatina 4 hours ago | hide | 5 comments
27. Can Programming Be Liberated, Period? (2008) [pdf] (weizmann.ac.il)
23 points by sktrdie 7 hours ago | hide | 20 comments
28. Ask HN: Any recommended books on developing mental models?
166 points by febin 5 hours ago | hide | 38 comments
29. My Favorite Papers of 2017 (nicolabortignon.com)
55 points by snickmy 5 hours ago | hide | 11 comments
30. The Fish That Took a Century to Name (nautil.us)
16 points by dnetesn 3 hours ago | hide | discuss
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: