Hacker News
@hackernewslive
24.8K
subscribers
218K
links
Download Telegram
Join
Hacker News
24.8K subscribers
Hacker News
Interfacing with Zig, a BDFL-run project
Article
,
Comments
kristoff.it
Interfacing with Zig, a BDFL-run Project
Loris Cro's Blog
👍
👎
Hacker News
Leaked Scripps records reveal automated mark-ups for hospital care
Article
,
Comments
Los Angeles Times
Column: Leaked SoCal hospital records reveal huge, automated markups for healthcare
Screenshots of a system used by Scripps Memorial Hospital show markups of as much as 675% being imposed automatically during treatment.
👍
👎
Hacker News
Ask HN: Favorite Thing Built to Last?
Article,
Comments
👍
👎
Hacker News
NCC Group’s Cryptopals Guided Tour
Article
,
Comments
NCC Group Research Blog
Announcing NCC Group’s Cryptopals Guided Tour!
Hello and welcome to NCC Group’s Cryptopals guided tour! This post is the first in a series of eight installments covering the solutions to the Cryptopals Crypto Challenges. These have been a…
👍
👎
Hacker News
Ask HN: Favorite Nonfiction Books of 2021?
Article,
Comments
👍
👎
Hacker News
Imagor is a fast, Docker-ready image processing server written in Go
Article
,
Comments
GitHub
GitHub - cshum/imagor: Fast, secure image processing server and Go library, using libvips
Fast, secure image processing server and Go library, using libvips - cshum/imagor
👍
👎
Hacker News
Show HN: Decentralized, Mutable, Serverless Torrent Swarm Websites
Article
,
Comments
GitHub
GitHub - publiusfederalist/federalist: Access files on the decentralized, unblockable torrent swarm and visit links using Handshake…
Access files on the decentralized, unblockable torrent swarm and visit links using Handshake domains. Decentralized internet is here. - publiusfederalist/federalist
👍
👎
Hacker News
DeepMind’s AI helps untangle the mathematics of knots
Article
,
Comments
Nature
DeepMind’s AI helps untangle the mathematics of knots
Nature - The machine-learning techniques could benefit other areas of maths that involve large data sets.
👍
👎
Hacker News
Interview with Anders Hejlsberg on Delphi (1995)
Article
,
Comments
TheOpenForce.com
.EXE Interview with Anders Hejlsberg on Delphi (1995)
To commemorate the 25th anniversary of Delphi on Feb 14, 2002 here is a trannoscript of an interview with Anders Hejlsberg, Chief Architect of Delphi conducted by .EXE Magazine editor Will Watts from 1995. Anders discusses the design and development...
👍
👎
Hacker News
Better.com
CEO Vishal Garg steps back as employees detail how he ‘led by fear’
Article
,
Comments
TechCrunch
Better.com CEO Vishal Garg steps back as employees detail how he ‘led by fear’
Looks like Better.com CEO Vishal Garg’s behavior is catching up to him.
👍
👎
Hacker News
Up all night with a Twitch millionaire
Article
,
Comments
👍
👎
Hacker News
Yamaha DX7 chip reverse-engineering, part 4: how algorithms are implemented
Article
,
Comments
Righto
Yamaha DX7 chip reverse-engineering, part 4: how algorithms are implemented
The Yamaha DX7 digital synthesizer (1983) was the classic synthesizer in 1980s pop music. It uses two custom digital chips to generate sou...
👍
👎
Hacker News
0-Day Vulnerability on Log4j
Article
,
Comments
Sonatype
What is the Log4j exploit?
Learn about the Log4j vulnerability and how you can combat it. Read this comprehensive guide to get actionable tips.
👍
👎
Hacker News
It's Increasingly Obvious Apple's 'Do Not Track' Button Is Privacy Theater
Article
,
Comments
Techdirt
Apple's 'Do Not Track' Button Is Privacy Theater
Earlier this year Apple received ample coverage about how the company was making privacy easier for its customers by introducing a new...
👍
👎
Hacker News
Sleep technique used by Salvador Dalí works
Article
,
Comments
livescience.com
Sleep technique used by Salvador Dalí really works
Some of the world's most creative minds, including Salvador Dalí and Thomas Edison described using this sleep technique to bolster creativity.
👍
👎
Hacker News
2,700-year-old leather armor proves technology transfer happened in antiquity
Article
,
Comments
ScienceDaily
2,700-year-old leather armor proves technology transfer happened in antiquity
Researchers have investigated a unique leather scale armor found in the tomb of a horse rider in Northwest China. Design and construction details of the armor indicate that it originated in the Neo-Assyrian Empire between the 6th and 8th century BCE before…
👍
👎
Hacker News
“Standing Up for Us Plebs.” Amazon Leaders Reject Policy to Push Employees Out
Article
,
Comments
Substack
“Standing Up For Us Plebs.” Amazon Leaders Reject Policy To Push Employees Out.
Leaked memo shows Amazon Music’s senior leadership didn’t want to go along with Amazon’s plan to manage out the bottom 6% of their workforce.
👍
👎
Hacker News
Three systems beneath network effects
Article
,
Comments
Every
The Three Systems Beneath Network Effects
An exclusive excerpt from a16z general partner Andrew Chen’s new book, The Cold Start Problem
👍
👎
Hacker News
Summary of the AWS Service Event in the Northern Virginia (US-East-1) Region
Article
,
Comments
👍
👎
Hacker News
Kropotkin escapes from prison
Article
,
Comments
CrimethInc.
June 30, 1876: Peter Kropotkin Escapes from Prison
On the occasion of Peter Kropotkin's birthday, we present an account of his escape from prison in Tsarist Russia.
👍
1
👍
👎
Hacker News
Plenoxels
Article
,
Comments
👍
👎
TWeb.init({scrollToPost:'hackernewslive/115000'});