Hacker News
@hackernewslive
24.8K
subscribers
218K
links
Download Telegram
Join
Hacker News
24.8K subscribers
Hacker News
An Introduction to JQ
Article
,
Comments
Earthly Blog
An Introduction to JQ
In this article, I'm going to go over the basics building blocks of jq in enough depth that you will be able to understand how jq works.
👍
👎
Hacker News
Launch HN: Level (YC S21) – Flexible financing for early-stage lending startups
Article,
Comments
👍
👎
Hacker News
Using Emacs in an IDE World
Article
,
Comments
andrew
Using Emacs in an IDE world
I remember the sad day that I finally gave up on using Emacs for Java development at work. I had spent hours trying to configure it to properly index all of the files so that I could go to definition easily. My mentor, the old Lisp guy with the insane init.el…
👍
👎
Hacker News
HyperPhysics
Article
,
Comments
👍
👎
Hacker News
SQL vs. NoSQL Is the Wrong Distinction
Article
,
Comments
www.softwareatscale.dev
SQL vs NoSQL is the Wrong Distinction
A misconception that I held for a really long time was that systems that use SQL (Structured Query Language) are by definition relational databases, and systems that don’t (e.g., MongoDB, Cassandra) are non-relational. It’s easy to understand whether a database…
👍
👎
Hacker News
Intel’s Thread Director: Assisting the OS to make task placement decisions
Article
,
Comments
AnandTech
Intel Architecture Day 2021: Alder Lake, Golden Cove, and Gracemont Detailed
One of the biggest criticisms that I’ve levelled at the feet of Intel since it started talking about its hybrid processor architecture designs has been the ability to manage threads in an intelligent way. When you have two cores of different performance and…
👍
👎
Hacker News
India's living dead: 'They stared at me like I was a ghost'
Article
,
Comments
Bbc
India's living dead: 'They stared at me like I was a ghost'
If you're dead you can't own land - so if someone obtains your death certificate you could lose everything.
👍
👎
Hacker News
Locality Sensitive Hashing (LSH): Practical and Illustrated Guide
Article
,
Comments
www.pinecone.io
Locality Sensitive Hashing (LSH): The Illustrated Guide
👍
👎
Hacker News
World's biggest wind turbine shows the disproportionate power of scale
Article
,
Comments
New Atlas
World's biggest wind turbine shows the disproportionate power of scale
China's MingYang Smart Energy has announced an offshore wind turbine even bigger than GE's monstrous Haliade-X. The MySE 16.0-242 is a 16-megawatt, 242-meter-tall (794-ft) behemoth capable of powering 20,000 homes per unit over a 25-year service life.
👍
👎
Hacker News
Miller CLI – Like Awk, sed, cut, join, and sort for CSV, TSV and JSON
Article
,
Comments
GitHub
GitHub - johnkerl/miller: Miller is like awk, sed, cut, join, and sort for name-indexed data such as CSV, TSV, and tabular JSON
Miller is like awk, sed, cut, join, and sort for name-indexed data such as CSV, TSV, and tabular JSON - johnkerl/miller
👍
👎
Hacker News
Ask HN: Companies of one, what is your tech stack?
Article,
Comments
👍
👎
Hacker News
Turing Pi V2 is here
Article
,
Comments
Turing Pi
Turing Pi V2 is here
It’s been a long time since we announced the Turing Pi V2, but finally, we are ready to reveal all the details of the new cluster board. But first, we want to thank you all for your patience and for every feedback you gave us along the way. We appreciate…
👍
👎
Hacker News
The Principles Underlying Radio Communication
Article
,
Comments
Internet Archive
The principles underlying radio communication : United States. National Bureau of Standards : Free Download, Borrow, and Streaming…
Radio publications: p. 568-577
👍
👎
Hacker News
A catalog of naturally occurring images whose Apple NeuralHash is identical
Article
,
Comments
GitHub
GitHub - roboflow-ai/neuralhash-collisions: A catalog of naturally occurring images whose Apple NeuralHash is identical.
A catalog of naturally occurring images whose Apple NeuralHash is identical. - GitHub - roboflow-ai/neuralhash-collisions: A catalog of naturally occurring images whose Apple NeuralHash is identical.
👍
👎
Hacker News
Adobe: The Psychology of User Offboarding
Article
,
Comments
Growth.Design
Adobe: The Psychology of User Offboarding
Discover the user offboarding tactics used by Adobe and how to design a great subnoscription cancellation flows without relying on unethical dark patterns.
👍
👎
Hacker News
An epic treatise on scheduling, bug tracking, and triage (2017)
Article
,
Comments
apenwarr.ca
An epic treatise on scheduling, bug tracking, and triage
[Note 2017-12-29: the news.ycombinator.com
discussion of this post is unusually useful. You may want to read it
first.]
[Note 2018-09-01:...
👍
👎
Hacker News
U.S. drone pilot leaks footage reveals accidental killing of children and adults
Article
,
Comments
Eminetra.co.uk
U.S. drone pilot leaks footage reveals accidental killing of two children and two adults in Afghanistan - Eminetra.co.uk
U.S. drone pilot working at Afghanistan He admitted that he had accidentally killed two Afghan civilians and a child, and questioned the tactics used by his troops to complete the withdrawal. The pilot worked in Helmand in 2019, he told the website Veterinary…
👍
👎
Hacker News
My Journey as a Self-Taught Programmer
Article
,
Comments
Ronnie Atuhaire's Blog
🤓
My Journey as a Self-Taught Programmer
How I became a self-taught programmer with online free resources without boot camps and having dropped out of campus.
👍
👎
Hacker News
S.Korea parliament committee votes to curb Google, Apple commission dominance
Article
,
Comments
Reuters
S.Korea parliament committee votes to curb Google, Apple commission dominance
A South Korean parliamentary committee voted on Wednesday to recommend amending a law, a key step toward banning Google and Apple from forcibly charging software developers commissions on in-app purchases, the first such curb by a major economy.
👍
👎
Hacker News
The leak that brought the H-bomb debate out of the cold
Article
,
Comments
Restricted Data: A Nuclear History Blog
The leak that brought the H-bomb debate out of the cold | Restricted Data
A bizarre leak from a powerful Senator made the Top Secret debate over building the hydrogen bomb part of national discourse — and doomed its direction.
👍
👎
Hacker News
The most underused browser feature: reader mode
Article
,
Comments
frankgroeneveld.nl
The most underused browser feature | Frank's blog
A great feature that is available in almost every browser allows you to reject the cookie consent popup.
👍
👎
TWeb.init({scrollToPost:'hackernewslive/107265'});