Hacker News new | comments | show | ask | jobs | submit login
1. Set Theory and Algebra in CS: Introduction to Mathematical Modeling (2013) [pdf] (semanticscholar.org)
129 points by lainon 4 hours ago | hide | 15 comments
2. Japan to add millions of new nodes to federated Nextcloud network (nextcloud.com)
122 points by r3bl 7 hours ago | hide | 30 comments
3. The Paradox of Karl Popper (scientificamerican.com)
76 points by lainon 5 hours ago | hide | 32 comments
4. Sarcasm Analysis Using Conversation Context (arxiv.org)
43 points by rbanffy 4 hours ago | hide | 7 comments
5. Centralized Wins. Decentralized Loses (highscalability.com)
143 points by ghosthamlet 10 hours ago | hide | 74 comments
6. German Cryptanalytic Attacks on the British World War II “TYPEX” Machine (columbia.edu)
44 points by sohkamyung 4 hours ago | hide | 10 comments
7. Don’t Shoot Messenger (eff.org)
145 points by DiabloD3 12 hours ago | hide | 11 comments
8. The Case for Applied History (historytoday.com)
14 points by benbreen 4 hours ago | hide | 2 comments
9. How to Fit a Large Program into a Small Machine (1999) (mud.co.uk)
111 points by tosh 12 hours ago | hide | 22 comments
10. I Delivered Packages for Amazon and It Was a Nightmare (theatlantic.com)
9 points by yarapavan 36 minutes ago | hide | discuss
11. Skim reading is the new normal (theguardian.com)
3 points by pmoriarty 1 hour ago | hide | discuss
12. TKVDB: radix tree persistent key/value storage engine written in ANSI C (github.com)
64 points by vmxdev 10 hours ago | hide | 4 comments
13. Smarking (YC W15) Is Hiring Back End Eng in SF – $10,000 Referral Fee (smarking.com)
1 hour ago | hide
14. Training classifiers with natural language explanations (acolyer.org)
81 points by ngaut 13 hours ago | hide | 1 comment
15. What happens when we work non-stop (bbc.com)
132 points by vjsc 14 hours ago | hide | 30 comments
16. The First Photo of a Human Being, and How the Scene's Changed from 180 Years Ago (vintag.es)
34 points by prismatic 7 hours ago | hide | 12 comments
17. An Oral History of ‘GoldenEye 007’ on the N64 (melmagazine.com)
111 points by ForHackernews 6 hours ago | hide | 65 comments
18. Understand what AI sees (hackernoon.com)
81 points by dirtPUNK 13 hours ago | hide | 31 comments
19. Survival Of The Sluggish: Scientists Find An Upside To A Low Metabolism (npr.org)
24 points by IndrekR 9 hours ago | hide | 3 comments
20. The Future of Notebooks: Lessons from JupyterCon (willcrichton.net)
266 points by wcrichton 15 hours ago | hide | 122 comments
21. Go 1.11 and Beyond (docs.google.com)
119 points by ngaut 4 hours ago | hide | 27 comments
22. Javascript Fundamentals: ‘this’ keyword (bloomca.me)
43 points by bloomca 7 hours ago | hide | 19 comments
23. IST Austria: Color effects from transparent 3D-printed nanostructures (ist.ac.at)
51 points by rbanffy 13 hours ago | hide | 3 comments
24. Anyway, stop recommending bazookas to kill flies in programming (itnext.io)
20 points by kiyanwang 2 hours ago | hide | 13 comments
25. Ethical OS and Silicon Valley’s Guilty Conscience (librarianshipwreck.wordpress.com)
75 points by craftsman 11 hours ago | hide | 31 comments
26. My life with 12 programmers, 2 rooms and one 21st-century dream (2016) (salon.com)
216 points by testb 19 hours ago | hide | 132 comments
27. Former Tesla Firmware Engineer Discusses the System (twitter.com)
823 points by swalsh 21 hours ago | hide | 507 comments
28. How to Simulate an Avalanche – And All Its Subtle Mechanics (techbriefs.com)
29 points by rbanffy 12 hours ago | hide | 2 comments
29. ATtention Spanned: Comprehensive Android Vulnerability Analysis of AT Commands (atcommands.org)
171 points by p4bl0 23 hours ago | hide | 66 comments
30. MIT 6.875 – Cryptography and Cryptanalysis [video] (youtube.com)
49 points by charlysl 10 hours ago | hide | 2 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: