Toggle navigation
Thing
r
Knowledge Organized
Home
About
Sign in
Sign up
HackerNews frontpage feed bot
hn
Web
news.ycombinator.com
Joined
December 2013
Things (38332)
Links
(38170)
Images
(13)
Videos
(149)
User feed
(72082)
When Grandmasters Blunder
A statistical analysis of chess.
medium.com
-
11 years ago
-
link
namcookanalytics.com
-
11 years ago
-
Frontend dev is getting exhausting • /r/javascript
I remember when I was learning Ruby on Rails years ago. I've never had that feeling where I thought Rails would go away any time soon. Even now --...
reddit.com
-
11 years ago
-
Who Can Name the Bigger Number?
scottaaronson.com
-
11 years ago
-
Atomicity, Interlocked, and Memory Operation Optimizations in C#
An Explanation of C# Atomicity, Interlocked, Volatile, and Memory Operation Optimizations in Multi-threaded Programs.
thith.github.com
-
11 years ago
-
How Big Can Quantum Weirdness Get?
The principle of superposition is usually thought to apply to the tiniest particles, but physicists are making it scale up.
motherboard.vice.com
-
11 years ago
-
Desert Island Papers: Peter Alvaro
There's a famous UK radio programme that's been running since 1942 called 'Desert Island Discs.' This is a programme in which "a well-known person is asked the question, if you were to be cast away...
blog.acolyer.org
-
11 years ago
-
The Hail Mary Plan to Stop Rhino Poaching By Growing Horns in a Lab
A new source of rhino horn could stop the black market—or simply drive prices for 'wild' horns even higher.
motherboard.vice.com
-
11 years ago
-
Google and blogs: “Shit.” – Marco.org
marco.org
-
11 years ago
-
draft-white-httpbis-spdy-analysis-00 - Analysis of SPDY and TCP Initcwnd
tools.ietf.org
-
11 years ago
-
Russian researchers expose breakthrough U.S. spying program
SAN FRANCISCO (Reuters) - The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving
reuters.com
-
11 years ago
-
Trickles protocol
cs.cornell.edu
-
11 years ago
-
The Great Bank Robbery: the Carbanak APT - Securelist
The main difference with other APT attacks is that Carbanak attackers do not see data but money as their primary target. Losses per bank range from $2.5 million
securelist.com
-
11 years ago
-
Securing API calls made on behalf of a user from an untrusted environment. | Andreas Dewes
andreas-dewes.de
-
11 years ago
-
My Second Hackathon Changed My Life - Major League Hacking News
A hackathon changed my lives. Four years ago today my friend John Britton took me to my first hackathon.
news.mlh.io
-
11 years ago
-
Routing on OpenStreetMap.org | OpenStreetMap Blog
blog.openstreetmap.org
-
11 years ago
-
Why Life Is Absurd
It’s too short. Discuss.
opinionator.blogs.nytimes.com
-
11 years ago
-
The C64 Re-Born ... Almost ...
zimmers.net
-
11 years ago
-
alfredxing/calc
A simple, fast command-line calculator in Go
github.com
-
11 years ago
-
Making the right choice with IBM Watson Tradeoff Analytics - Watson Dev
We are pleased to introduce IBM Watson Tradeoff Analytics, a new cognitive service that takes the guesswork out of decision making, available to the development community through the Watson Developer Cloud.
developer.ibm.com
-
11 years ago
-
«
1
1049
1050
1051
1052
1053
1054
1055
1056
1057
3605
»