Hacker News new | comments | show | ask | jobs | submit login
1. Apple’s Tim Cook makes blistering attack on the “data industrial complex” (techcrunch.com)
83 points by laktak 1 hour ago | hide | 66 comments
2. Carbon Removal Technologies (ycombinator.com)
959 points by sama 17 hours ago | hide | 542 comments
3. Myth of the Brown Recluse (ucr.edu)
25 points by josephpmay 2 hours ago | hide | 7 comments
4. Electrical properties of dendrites help explain our brain’s computing power (mit.edu)
6 points by magoghm 1 hour ago | hide | discuss
5. Helvetia – A lightweight approach to embed new languages into the host language (unibe.ch)
34 points by joubert 5 hours ago | hide | 5 comments
6. The State of Agile Software in 2018 (martinfowler.com)
52 points by fagnerbrack 3 hours ago | hide | 20 comments
7. Aptoide wins court battle against Google in landmark case (reuters.com)
105 points by crunchiebones 8 hours ago | hide | 53 comments
8. State considered harmful: A proposal for a stateless laptop (2015) (invisiblethings.org)
58 points by peter_d_sherman 7 hours ago | hide | 25 comments
9. Phrack Magazine (1985-2016) (phrack.org)
156 points by turrini 10 hours ago | hide | 35 comments
10. Perl 11 (perl11.org)
272 points by totalperspectiv 12 hours ago | hide | 208 comments
11. Swiss Tables and absl::Hash (abseil.io)
37 points by utopcell 5 hours ago | hide | 8 comments
12. Principles of Algorithmic Problem Solving (2017) [pdf] (kth.se)
229 points by ingve 14 hours ago | hide | 7 comments
13. Timercpp: JavaScript-like setTimeout and setInterval for C++ (github.com)
11 points by delvincasper 3 hours ago | hide | 25 comments
14. Lack of progress exposed by the Canary MacGuffin (rachelbythebay.com)
176 points by ingve 14 hours ago | hide | 109 comments
15. Scheme 9 from Empty Space, Reimagined (t3x.org)
68 points by nils-m-holm 8 hours ago | hide | 13 comments
16. Advanced techniques to implement fast hash tables (attractivechaos.wordpress.com)
121 points by fanf2 12 hours ago | hide | 14 comments
17. How a Massive Ad Fraud Scheme Exploited Android Phones to Steal Millions (buzzfeednews.com)
213 points by minimaxir 17 hours ago | hide | 79 comments
18. How We Wrote a Textbook (hibal.org)
108 points by Mageek 12 hours ago | hide | 16 comments
19. Bypass Paywalls – A Firefox extension to bypass paywalls of many news sites (addons.mozilla.org)
51 points by known 3 hours ago | hide | 24 comments
20. Amazon Pitches Facial Recognition to Monitor Immigrants (bloomberg.com)
186 points by rayvy 11 hours ago | hide | 179 comments
21. Redefining the Mole (nist.gov)
29 points by nj65537 7 hours ago | hide | 10 comments
22. Drilling Down on Depth Sensing and Deep Learning (berkeley.edu)
46 points by jonbaer 9 hours ago | hide | discuss
23. Free, Open Spaces: Brian Eno’s Favourite Records (2016) (thequietus.com)
33 points by crunchiebones 8 hours ago | hide | 17 comments
24. Neil Armstrong Remembered (uc.edu)
110 points by smacktoward 17 hours ago | hide | 39 comments
25. The Prophets of Cryptocurrency Survey the Boom and Bust (newyorker.com)
124 points by latchkey 17 hours ago | hide | 42 comments
26. When Sears Flourished, So Did Workers. At Amazon, It’s More Complicated (nytimes.com)
141 points by danso 10 hours ago | hide | 84 comments
27. Investigating Implausible Bloomberg Supermicro Stories (servethehome.com)
98 points by vanburen 17 hours ago | hide | 53 comments
28. Commodore Hacking Issue 9 (1995) (ffd2.com)
56 points by colinprince 14 hours ago | hide | 5 comments
29. Applicative WTF? (plover.com)
79 points by lainon 17 hours ago | hide | 15 comments
30. Deterministic quantum teleportation through fiber channels (sciencemag.org)
84 points by lainon 18 hours ago | hide | 43 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: