Thingr Knowledge Organized
  • Home
  • About
  • Sign in
  • Sign up

HackerNews frontpage feed bot
hn

Web
news.ycombinator.com
Joined December 2013
Things (38332)
  • Links (38170)
  • Images (13)
  • Videos (149)

All items

  • All (38332)
  • Links (38170)
  • Images (13)
  • Videos (149)
  • Atomicity, Interlocked, and Memory Operation Optimizations in C#

    An Explanation of C# Atomicity, Interlocked, Volatile, and Memory Operation Optimizations in Multi-threaded Programs.
    thith.github.com
     - 
    10 years ago -
  • How Big Can Quantum Weirdness Get?

    The principle of superposition is usually thought to apply to the tiniest particles, but physicists are making it scale up.
    motherboard.vice.com
     - 
    10 years ago -
  • Desert Island Papers: Peter Alvaro

    There's a famous UK radio programme that's been running since 1942 called 'Desert Island Discs.' This is a programme in which "a well-known person is asked the question, if you were to be cast away...
    blog.acolyer.org
     - 
    10 years ago -
  • The Hail Mary Plan to Stop Rhino Poaching By Growing Horns in a Lab

    A new source of rhino horn could stop the black market—or simply drive prices for 'wild' horns even higher.
    motherboard.vice.com
     - 
    10 years ago -
  • Google and blogs: “Shit.” – Marco.org
    marco.org
     - 
    10 years ago -
  • draft-white-httpbis-spdy-analysis-00 - Analysis of SPDY and TCP Initcwnd
    tools.ietf.org
     - 
    10 years ago -
  • Russian researchers expose breakthrough U.S. spying program

    SAN FRANCISCO (Reuters) - The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving
    reuters.com
     - 
    10 years ago -
  • Trickles protocol
    cs.cornell.edu
     - 
    10 years ago -
  • The Great Bank Robbery: the Carbanak APT - Securelist

    The main difference with other APT attacks is that Carbanak attackers do not see data but money as their primary target. Losses per bank range from $2.5 million
    securelist.com
     - 
    10 years ago -
  • Securing API calls made on behalf of a user from an untrusted environment. | Andreas Dewes
    andreas-dewes.de
     - 
    10 years ago -
  • My Second Hackathon Changed My Life - Major League Hacking News

    A hackathon changed my lives. Four years ago today my friend John Britton took me to my first hackathon.
    news.mlh.io
     - 
    10 years ago -
  • Routing on OpenStreetMap.org | OpenStreetMap Blog
    blog.openstreetmap.org
     - 
    10 years ago -
  • Why Life Is Absurd

    It’s too short. Discuss.
    opinionator.blogs.nytimes.com
     - 
    10 years ago -
  • The C64 Re-Born ... Almost ...
    zimmers.net
     - 
    10 years ago -
  • alfredxing/calc

    A simple, fast command-line calculator in Go
    github.com
     - 
    10 years ago -
  • Making the right choice with IBM Watson Tradeoff Analytics - Watson Dev

    We are pleased to introduce IBM Watson Tradeoff Analytics, a new cognitive service that takes the guesswork out of decision making, available to the development community through the Watson Developer Cloud.
    developer.ibm.com
     - 
    10 years ago -
  • Psychosis 'link' to potent cannabis
    bbc.co.uk
     - 
    10 years ago -
  • How Electrotherapy Could Help Improve Concentration

    New research on attentional brain waves shows how we suppress stimuli.
    motherboard.vice.com
     - 
    10 years ago -
  • Squid DTD Project
    devel.squid-cache.org
     - 
    10 years ago -
  • How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

    "Equation Group" ran the most advanced hacking operation ever uncovered.
    arstechnica.com
     - 
    10 years ago -
  • «
  • 1
  • 1041
  • 1042
  • 1043
  • 1044
  • 1045
  • 1046
  • 1047
  • 1048
  • 1049
  • 3582
  • »
2014 Thingr v0.29.2 - About - Contact
Created for people by Sebastian Hanula