Hacker News
@hackernewslive
24.6K
subscribers
216K
links
Download Telegram
Join
Hacker News
24.6K subscribers
Hacker News
Footage of Chang'e-6's land on far side of the moon
Article
,
Comments
🤡
3
🌭
1
Hacker News
SPI Flash
Article
,
Comments
Trammell Hudson's Projects
SPI flash
SPI Flash reader built from a Teensy or Arduino
🌭
1
🎃
1
Hacker News
Hotwire: HTML Over The Wire
Article
,
Comments
hotwired.dev
HTML Over The Wire | Hotwire
Hotwire is an alternative approach to building modern web applications without using much JavaScript by sending HTML instead of JSON over the wire.
🥱
3
❤🔥
2
🌭
1
Hacker News
Circle C++ with Memory Safety
Article
,
Comments
🌭
2
Hacker News
Call Your Local Wizard
Article
,
Comments
Slate Magazine
An Entertaining New Book Will Tell You Something You Never Knew About Witchcraft
The medieval service magicians who would find missing spoons, identify a thief, or help you win at cards.
💩
8
🥰
5
🌭
1
Hacker News
Call Your Local Wizard
Article
,
Comments
Slate Magazine
An Entertaining New Book Will Tell You Something You Never Knew About Witchcraft
The medieval service magicians who would find missing spoons, identify a thief, or help you win at cards.
🤮
12
❤
3
🌭
1
Hacker News
A secure embedded operating system for microcontrollers
Article
,
Comments
⚡
11
🔥
1
🌭
1
Hacker News
Lord Kelvin and His Analog Computer
Article
,
Comments
IEEE Spectrum
Lord Kelvin and His Analog Computer
This tide-predicting machine was one of many advances he made to maritime tech
🫡
7
🌭
1
Hacker News
Milvus Lite: The Lightweight Version of Milvus
Article
,
Comments
🌭
1
Hacker News
Workmanship Standard for Crimping, Interconnecting Cables, Harnesses, and Wiring
Article
,
Comments
💅
4
🌭
2
🥰
1
Hacker News
The Canon Cat, the forgotten 1987 alternate-reality Mac (2019)
Article
,
Comments
Fast Company
Meet the Canon Cat, the forgotten 1987 alternate-reality Mac - Fast Company
The Mac’s original father envisioned a radically different machine than what Apple shipped in 1984. Then Canon gave him the chance to do things his way.
❤
3
🤔
1
🌭
1
Hacker News
Monads are like burritos (2009)
Article
,
Comments
The Universe of Discourse : Monads are like burritos
Monads are like burritos
From the highly eclectic blog of Mark Dominus
🌭
4
Hacker News
Parsing JSON Is a Minefield (2018)
Article
,
Comments
👍
4
🤡
1
🌭
1
Hacker News
Distributed Snapshots: Chandy-Lamport Protocol
Article
,
Comments
blog.fponzi.me
Distributed Snapshots: Chandy-Lamport protocol
Some forms of distributed snapshots were around for a while already when Chandy-Lamport's distributed snapshots paper was first published in 1985....
🌭
1
Hacker News
Re-Evaluating GPT-4's Bar Exam Performance
Article
,
Comments
SpringerLink
Re-evaluating GPT-4’s bar exam performance
Artificial Intelligence and Law - Perhaps the most widely touted of GPT-4’s at-launch, zero-shot capabilities has been its reported 90th-percentile performance on the Uniform Bar Exam. This...
🤓
7
🌭
2
👍
1
Hacker News
Everything I know about the fast inverse square root algorithm
Article
,
Comments
GitHub
githublog/2024/5/29/fast-inverse-sqrt.md at main · francisrstokes/githublog
I'm sick of complex blogging solutions, so markdown files in a git repo it is - francisrstokes/githublog
🌭
2
🔥
1
Hacker News
Upgrading my Chumby 8 kernel part 10: RTC
Article
,
Comments
🌭
2
Hacker News
Nuclear material left in "Swap Shop" at UK Hacker camp emfcamp
Article
,
Comments
meow.social - the meowstodon instance for creatures fluffy, scaly and otherwise
Tryst
🏴
🇮🇪
:ms_asexual_flag: :ms_cat_grin: (@tryst@meow.social)
Attached: 1 image
Did you take one of these objects from the #emf2024 swap shop?
If so, please could you get in touch? DM me here, Telegram @tryst_me or call DECT 8797
EDIT: This has now been resolved. The person who brought them to swap shop has confirmed…
💅
12
😁
4
🌭
1
🍌
1
Hacker News
Ask HN: What was your most humbling learning moment?
Article,
Comments
👍
3
🌭
1
Hacker News
Why is Snapshot Isolation not enough?
Article
,
Comments
🌭
1
Hacker News
Routers cyber security best practices
Article
,
Comments
Canadian Centre for Cyber Security
Routers cyber security best practices - ITSAP.80.019 - Canadian Centre for Cyber Security
This document provides information on cyber security best practices to protect your routers from being compromised.
🌭
1
TWeb.init({scrollToPost:'hackernewslive/182733'});