Thingr Knowledge Organized
  • Home
  • About
  • Sign in
  • Sign up

HackerNews frontpage feed bot
hn

Web
news.ycombinator.com
Joined December 2013
Things (38332)
  • Links (38170)
  • Images (13)
  • Videos (149)

User feed (72082)

  • Marc Andreessen Tweetstorms

    Collection of essays from Marc Andreessen (entrepreneur, investor, and software engineer) published on Twitter.
    gitbook.io
     - 
    11 years ago -
  • Millennial

    « Generation Wuss » by Bret Easton Ellis
    vanityfair.fr
     - 
    11 years ago -
  • The Deadly Stupidities Around Ebola. In the Pipeline:
    pipeline.corante.com
     - 
    11 years ago -
  • The Megalomaniac Bore: Write your own Virtual CPU in C++ (4001 CPU)
    megalomaniacbore.blogspot.com
     - 
    11 years ago -
  • Julia language: inside the corporation

    Outline of my experience introducing and championing the usage of Julia Language inside a medium sized Financial organization. Cover reason for using it, reas…
    slideshare.net
     - 
    11 years ago -
  • Julia language: inside the corporation

    Outline of my experience introducing and championing the usage of Julia Language inside a medium sized Financial organization. Cover reason for using it, reas…
    slideshare.net
     - 
    11 years ago -
  • JuliaDiff

    Home of the JuliaDiff project.
    juliadiff.org
     - 
    11 years ago -
  • Short Story - Superiority - by Arthur C. Clarke

    Robert Lee Mayo Books Short Stories
    mayofamily.com
     - 
    11 years ago -
  • JuliaLang/julia

    julia - The Julia Language: A fresh approach to technical computing.
    github.com
     - 
    11 years ago -
  • Why You Should Not Use an RDBMS for Messaging
    functionwhatwhat.com
     - 
    11 years ago -
  • Why a leading professor of new media just banned technology use in class

    Anyone distracted in class doesn’t just lose out on the content of the discussion but creates a sense of permission that opting out is OK, and, worse, a haze of second-hand distraction for peers.
    washingtonpost.com
     - 
    11 years ago -
  • Shell Shock Exploitation Vectors — Indistinguishable from Random

    A catalog of exploitation vectors for Shell Shock
    dfranke.us
     - 
    11 years ago -
  • 2014-09-derbycon-talk - Google Präsentationen
    docs.google.com
     - 
    11 years ago -
  • E. W. Dijkstra Archive: "Why is software so expensive?" An explanation to the hardware designer. (EWD 648)
    cs.utexas.edu
     - 
    11 years ago -
  • Antisocial - Ello and Facebook — adamwilcox.org
    adamwilcox.org
     - 
    11 years ago -
  • Developing Software in a Hostile Environment
    openbsd.org
     - 
    11 years ago -
  • Tomb mystery captivates Greece
    bbc.com
     - 
    11 years ago -
  • The Last Answer

    The Last Answer by Isaac Asimov — © 1980 Murray Templeton was forty-five years old, in the prime of life, and with all parts of his body in perfect working order except for certain key portions of ...
    thrivenotes.com
     - 
    11 years ago -
  • ⚠ Be careful with unicode ⚠ | Hacker News
    news.ycombinator.com
     - 
    11 years ago -
  • mubix/shellshocker-pocs

    shellshocker-pocs - Collection of Proof of Concepts and Potential Targets for #ShellShocker
    github.com
     - 
    11 years ago -
  • «
  • 1
  • 1911
  • 1912
  • 1913
  • 1914
  • 1915
  • 1916
  • 1917
  • 1918
  • 1919
  • 3605
  • »
2014 Thingr v0.29.2 - About - Contact
Created for people by Sebastian Hanula