Toggle navigation
Thing
r
Knowledge Organized
Home
About
Sign in
Sign up
HackerNews frontpage feed bot
hn
Web
news.ycombinator.com
Joined
December 2013
Things (38332)
Links
(38170)
Images
(13)
Videos
(149)
User feed
(72082)
Op-Ed: In defense of Tor routers
One InvizBox creator responds to assertion that Tor routers are "ridiculous."
arstechnica.com
-
10 years ago
-
Under The Influence: New York Hardcore
In the first episode of our series Under the Influence, we go from the streets of the Lower East Side all the way to South Korea to examine one of the most d...
youtube.com
-
10 years ago
-
jpadilla/juicebox
juicebox - A virtual machine designed for programming workshops.
github.com
-
10 years ago
-
Scientists see deeper Yellowstone magma | University of Utah News
unews.utah.edu
-
10 years ago
-
Fullscreen Maps
Toggle the visibility of Google Maps and Bing Maps user interface elements for a fullscreen viewing experience.
addons.mozilla.org
-
10 years ago
-
Brag about open-source projects you're proud of | Hacker News
news.ycombinator.com
-
10 years ago
-
link
www3.cs.stonybrook.edu
-
10 years ago
-
Apple Begins Offering Virtual “Personal Setup” Appointments To New Watch Owners
As a number of early customers will receive their Apple Watch smartwatches today, Apple has also begun to send out email invitations offering "personal..
techcrunch.com
-
10 years ago
-
RinohType Status Update 1
Almost 18 months have passed since I announced RinohType, so it’s about time for a little status update. Inspired by some of the comments on the last blog article, I decided to focus on reStructuredText support, as this would make RinohType much more u...
mos6581.org
-
10 years ago
-
Hash Collision Probabilities
A hash function takes an item of a given type and generates an integer hash value within a given range. The input items can be anything: strings, …
preshing.com
-
10 years ago
-
Able - Collaborative Small Business Lending
blog.ablelending.com
-
10 years ago
-
Schneier on Security: The Further Democratization of QUANTUM
schneier.com
-
10 years ago
-
Wormholes Untangle a Black Hole Paradox | Quanta Magazine
A bold new idea aims to link two mutually incompatible descriptions of the universe. It may also reveal how quantum information is responsible for constructing
quantamagazine.org
-
10 years ago
-
A Javascript-based DDoS Attack as seen by Safe Browsing
googleonlinesecurity.blogspot.com
-
10 years ago
-
SparkFun CryptoShield - DEV-13183 - SparkFun Electronics
DEV-13183: The CryptoShield is a dedicated security peripheral for the Arduino and was made in collaboration with a previous Hacker In Residence, [Josh Datko](http://
sparkfun.com
-
10 years ago
-
Making It Better: ASP.NET with Visual Basic 14 - .NET Web Development and Tools Blog - Site Home - MSDN Blogs
.NET Web Development and Tools Blog
blogs.msdn.com
-
10 years ago
-
Cloud security reaches silicon
System for defending against memory-access attacks implemented in chips.
newsoffice.mit.edu
-
10 years ago
-
Write the Perfect Email to Anyone With This Creepy Site | WIRED
Crystal is definitely creepy, perhaps useful, and almost certainly a look at how we'll communicate in the future.
wired.com
-
10 years ago
-
Online Account Servicing | Capital One
Welcome to your Capital One online account service.
capitaloneonline.co.uk
-
10 years ago
-
Amazon CTO Werner Vogels Shares Nine Patterns of Cloud Adoption
At the Amazon Web Services AWS Summit London, Werner Vogels shared nine patterns of cloud adoption that AWS have observed from its customer base over the past nine years of operation. Vogels suggested that the ease of operation, low cost and additional...
infoq.com
-
10 years ago
-
«
1
577
578
579
580
581
582
583
584
585
3605
»