Hacker News new | comments | show | ask | jobs | submit login
1. Fake books sold on Amazon could be used for money laundering (theguardian.com)
47 points by DanBC 2 hours ago | hide | 30 comments
2. Make your own sourdough (github.com)
216 points by hendricius 5 hours ago | hide | 93 comments
3. Microsoft attempts to spin its role in counterfeiting case (techcrunch.com)
64 points by sizzle 3 hours ago | hide | 31 comments
4. A Few Thoughts on Ray Ozzie’s “Clear” Proposal (cryptographyengineering.com)
38 points by Hagelin 3 hours ago | hide | 9 comments
5. Wooden Statue Found in Late 1890s Likely Dates Back More Than 11,000 Years (smithsonianmag.com)
52 points by forgingahead 4 hours ago | hide | 3 comments
6. "@" on Twitter (twitter.com)
375 points by isp 12 hours ago | hide | 99 comments
7. A Cartography Nerd's Guide to Custom Map-Making (ideo.com)
138 points by dcschelt 11 hours ago | hide | 22 comments
8. Context Is Everything: Finding Meaning Statistically in Semantic Spaces (arxiv.org)
23 points by ghosthamlet 3 hours ago | hide | 1 comment
9. Interview with CTO and Co-founder of Zapier on Working with Remote Engineers (youteam.io)
155 points by Riphyak 13 hours ago | hide | 42 comments
10. Warning signs for TSB's IT meltdown were clear a year ago – insider (theguardian.com)
31 points by YeGoblynQueenne 1 hour ago | hide | 18 comments
11. Structured Procrastination (1995) (structuredprocrastination.com)
135 points by rbanffy 14 hours ago | hide | 27 comments
12. EU agrees on total ban of bee-harming pesticides (theguardian.com)
778 points by YeGoblynQueenne 23 hours ago | hide | 249 comments
13. Enhancing Pwned Passwords Privacy by Exclusively Supporting Anonymity (troyhunt.com)
7 points by weinzierl 3 hours ago | hide | discuss
14. Why Do So Many Judges Cite Jane Austen in Legal Decisions? (electricliterature.com)
46 points by pepys 10 hours ago | hide | 5 comments
15. How does dynamic dispatch work in WebAssembly? (fitzgeraldnick.com)
90 points by mnemonik 14 hours ago | hide | 11 comments
16. William Stein on the struggle for open source funding in pure mathematics [pdf] (ams.org)
61 points by adenadel 11 hours ago | hide | 9 comments
17. NPR Retracts Story 'The Man Who Spent $100K To Remove A Lie From Google' (npr.org)
360 points by jessaustin 18 hours ago | hide | 250 comments
18. 8OD – Arduino form factor Intel 8086 (mattmillman.com)
93 points by userbinator 15 hours ago | hide | 5 comments
19. Quartzy (YC S11) Is Hiring Software Engineers (Palo Alto / Remote-US) (grnh.se)
2 hours ago | hide
20. How Poetry and Math Intersect (smithsonianmag.com)
55 points by Hooke 14 hours ago | hide | 31 comments
21. What happens when you run `cp` on the command line? (safia.rocks)
29 points by ingve 4 hours ago | hide | 5 comments
22. Cross Chess (wikipedia.org)
30 points by tosh 9 hours ago | hide | 10 comments
23. Finding design errors before it’s too late (arm.com)
63 points by rbanffy 15 hours ago | hide | discuss
24. User IDs probably shouldn't be passed around as ints (rachelbythebay.com)
6 points by weinzierl 3 hours ago | hide | 2 comments
25. DNA blunder creates phantom serial killer (2009) (independent.co.uk)
47 points by wglb 13 hours ago | hide | 9 comments
26. Institutions will try to preserve the problem to which they are the solution (kk.org)
14 points by gits1225 8 hours ago | hide | 2 comments
27. Credit card fraud warning signs (candyjapan.com)
251 points by hamstercat 18 hours ago | hide | 194 comments
28. A Module-System Discipline for Model-Driven Software Development (2017) (programming-journal.org)
45 points by mpweiher 14 hours ago | hide | 4 comments
29. Writing FreeBSD Malware [video] (youtube.com)
27 points by adamnemecek 10 hours ago | hide | 3 comments
30. The Fable of the Dragon-Tyrant (2005) (nickbostrom.com)
48 points by AdeptusAquinas 7 hours ago | hide | 23 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: