Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
1.Queueing to publish in AI and CS (damaru2.github.io)
39 points by damaru2 2 hours ago | hide | 16 comments
2.F-Droid and Google’s developer registration decree (f-droid.org)
604 points by gumby271 7 hours ago | hide | 213 comments
3.Play snake in the URL address bar (ferrei.ro)
589 points by macote 12 hours ago | hide | 67 comments
4.Zero ASIC releases Wildebeest, the highest performance FPGA synthesis tool (zeroasic.com)
111 points by stefanpie 6 hours ago | hide | 27 comments
5.Show HN: Swapple, a little daily puzzle on linear reversible circuit synthesis (fuglede.dk)
28 points by fuglede_ 3 hours ago | hide | 6 comments
6.Zlib visualizer (lynn.github.io)
157 points by elisaado 9 hours ago | hide | 17 comments
7.Users Only Care About 20% of Your Application (idiallo.com)
9 points by jnord 2 hours ago | hide | 3 comments
8.Go ahead, write the “stupid” code (spikepuppet.io)
148 points by spikepuppet 11 hours ago | hide | 81 comments
9.Fernflower Java Decompiler (github.com/jetbrains)
59 points by bartekpacia 8 hours ago | hide | 21 comments
10.Cleaning house in Nx monorepo, how i removed unused deps safely (johnjames.blog)
63 points by birdculture 8 hours ago | hide | 22 comments
11.Primer on FedEx's Distribution Network (2024) (ontheseams.substack.com)
90 points by hyperific 8 hours ago | hide | 20 comments
12.The Long Trip from Silica to Smartphone (ieee.org)
51 points by sohkamyung 8 hours ago | hide | 8 comments
13.Eliminating Cold Starts 2: shard and conquer (cloudflare.com)
8 points by cmsparks 3 hours ago | hide | 1 comment
14.Bayesian Data Analysis, Third edition (2013) [pdf] (columbia.edu)
259 points by ibobev 16 hours ago | hide | 52 comments
15.Supermicro server motherboards can be infected with unremovable malware (arstechnica.com)
228 points by zdw 20 hours ago | hide | 112 comments
16.Reusable grocery bags durability test (cbc.ca)
14 points by colinprince 3 hours ago | hide | 30 comments
17.Privacy Badger is a free browser extension made by EFF to stop spying (privacybadger.org)
708 points by doener 20 hours ago | hide | 275 comments
18.Patagonian Welsh (wikipedia.org)
64 points by tintinnabula 10 hours ago | hide | 31 comments
19.What is "good taste" in software engineering? (seangoedecke.com)
90 points by olayiwoladekoya 3 hours ago | hide | 92 comments
20.High-Level Synthesis Synthesis (stefanabikaram.com)
21 points by stefanpie 6 hours ago | hide | 1 comment
21.The AI coding trap (chrisloy.dev)
585 points by chrisloy 18 hours ago | hide | 358 comments
22.Scm2wasm: A Scheme to WASM compiler in 600 lines of C, making use of WASM GC (lain.faith)
164 points by todsacerdoti 18 hours ago | hide | 20 comments
23.Farewell friends (humbledollar.com)
267 points by mooreds 12 hours ago | hide | 51 comments
24.Buyers of Radio Shack, Pier 1 brands accused of running $112M Ponzi scheme (cbsnews.com)
97 points by pseudolus 7 hours ago | hide | 70 comments
25.Show HN: Toolbrew – Free little tools without signups or ads (toolbrew.co)
225 points by andreisergo 19 hours ago | hide | 49 comments
26.Myoelectric Stimulation Silent Subwoofer for Body-Sensory Acoustic Sensation (ieee.org)
13 points by PaulHoule 4 hours ago | hide | discuss
27.The elusive roots of rosin potatoes (2022) (bittersoutherner.com)
18 points by moonka 7 hours ago | hide | 2 comments
28.Corral.BAS (basic-code.bearblog.dev)
34 points by ibobev 11 hours ago | hide | 11 comments
29.When I say “alphabetical order”, I mean “alphabetical order” (tronto.net)
504 points by sebtron 20 hours ago | hide | 299 comments
30.Failing to Understand the Exponential, Again (julian.ac)
134 points by lairv 21 hours ago | hide | 212 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: