Hacker News
new
|
comments
|
show
|
ask
|
jobs
|
submit
login
1.
Set Theory and Algebra in CS: Introduction to Mathematical Modeling (2013) [pdf]
(
semanticscholar.org
)
129 points
by
lainon
4 hours ago
|
hide
|
15 comments
2.
Japan to add millions of new nodes to federated Nextcloud network
(
nextcloud.com
)
122 points
by
r3bl
7 hours ago
|
hide
|
30 comments
3.
The Paradox of Karl Popper
(
scientificamerican.com
)
76 points
by
lainon
5 hours ago
|
hide
|
32 comments
4.
Sarcasm Analysis Using Conversation Context
(
arxiv.org
)
43 points
by
rbanffy
4 hours ago
|
hide
|
7 comments
5.
Centralized Wins. Decentralized Loses
(
highscalability.com
)
143 points
by
ghosthamlet
10 hours ago
|
hide
|
74 comments
6.
German Cryptanalytic Attacks on the British World War II “TYPEX” Machine
(
columbia.edu
)
44 points
by
sohkamyung
4 hours ago
|
hide
|
10 comments
7.
Don’t Shoot Messenger
(
eff.org
)
145 points
by
DiabloD3
12 hours ago
|
hide
|
11 comments
8.
The Case for Applied History
(
historytoday.com
)
14 points
by
benbreen
4 hours ago
|
hide
|
2 comments
9.
How to Fit a Large Program into a Small Machine (1999)
(
mud.co.uk
)
111 points
by
tosh
12 hours ago
|
hide
|
22 comments
10.
I Delivered Packages for Amazon and It Was a Nightmare
(
theatlantic.com
)
9 points
by
yarapavan
36 minutes ago
|
hide
|
discuss
11.
Skim reading is the new normal
(
theguardian.com
)
3 points
by
pmoriarty
1 hour ago
|
hide
|
discuss
12.
TKVDB: radix tree persistent key/value storage engine written in ANSI C
(
github.com
)
64 points
by
vmxdev
10 hours ago
|
hide
|
4 comments
13.
Smarking (YC W15) Is Hiring Back End Eng in SF – $10,000 Referral Fee
(
smarking.com
)
1 hour ago
|
hide
14.
Training classifiers with natural language explanations
(
acolyer.org
)
81 points
by
ngaut
13 hours ago
|
hide
|
1 comment
15.
What happens when we work non-stop
(
bbc.com
)
132 points
by
vjsc
14 hours ago
|
hide
|
30 comments
16.
The First Photo of a Human Being, and How the Scene's Changed from 180 Years Ago
(
vintag.es
)
34 points
by
prismatic
7 hours ago
|
hide
|
12 comments
17.
An Oral History of ‘GoldenEye 007’ on the N64
(
melmagazine.com
)
111 points
by
ForHackernews
6 hours ago
|
hide
|
65 comments
18.
Understand what AI sees
(
hackernoon.com
)
81 points
by
dirtPUNK
13 hours ago
|
hide
|
31 comments
19.
Survival Of The Sluggish: Scientists Find An Upside To A Low Metabolism
(
npr.org
)
24 points
by
IndrekR
9 hours ago
|
hide
|
3 comments
20.
The Future of Notebooks: Lessons from JupyterCon
(
willcrichton.net
)
266 points
by
wcrichton
15 hours ago
|
hide
|
122 comments
21.
Go 1.11 and Beyond
(
docs.google.com
)
119 points
by
ngaut
4 hours ago
|
hide
|
27 comments
22.
Javascript Fundamentals: ‘this’ keyword
(
bloomca.me
)
43 points
by
bloomca
7 hours ago
|
hide
|
19 comments
23.
IST Austria: Color effects from transparent 3D-printed nanostructures
(
ist.ac.at
)
51 points
by
rbanffy
13 hours ago
|
hide
|
3 comments
24.
Anyway, stop recommending bazookas to kill flies in programming
(
itnext.io
)
20 points
by
kiyanwang
2 hours ago
|
hide
|
13 comments
25.
Ethical OS and Silicon Valley’s Guilty Conscience
(
librarianshipwreck.wordpress.com
)
75 points
by
craftsman
11 hours ago
|
hide
|
31 comments
26.
My life with 12 programmers, 2 rooms and one 21st-century dream (2016)
(
salon.com
)
216 points
by
testb
19 hours ago
|
hide
|
132 comments
27.
Former Tesla Firmware Engineer Discusses the System
(
twitter.com
)
823 points
by
swalsh
21 hours ago
|
hide
|
507 comments
28.
How to Simulate an Avalanche – And All Its Subtle Mechanics
(
techbriefs.com
)
29 points
by
rbanffy
12 hours ago
|
hide
|
2 comments
29.
ATtention Spanned: Comprehensive Android Vulnerability Analysis of AT Commands
(
atcommands.org
)
171 points
by
p4bl0
23 hours ago
|
hide
|
66 comments
30.
MIT 6.875 – Cryptography and Cryptanalysis [video]
(
youtube.com
)
49 points
by
charlysl
10 hours ago
|
hide
|
2 comments
More
Guidelines
|
FAQ
|
Support
|
API
|
Security
|
Lists
|
Bookmarklet
|
Legal
|
Apply to YC
|
Contact
Search: