Hacker News
@hackernewslive
24.8K
subscribers
218K
links
Download Telegram
Join
Hacker News
24.8K subscribers
Hacker News
Checkers written in Rust and exported to WASM
Article
,
Comments
💩
12
🏆
8
🤮
1
🤡
1
🌭
1
Hacker News
Recommendations for designing magic numbers of binary file formats
Article
,
Comments
👍
3
🌭
1
Hacker News
Meta puts stop on promotion of tell-all book by former employee
Article
,
Comments
the Guardian
Meta puts stop on promotion of tell-all book by former employee
Social media company wins emergency arbitration ruling on book, Careless People by Sarah Wynn-Williams
🤬
33
👎
4
👏
3
😁
2
👍
1
🤡
1
🌭
1
🍌
1
Hacker News
The exceptional Jordan algebra (2020)
Article
,
Comments
Complex Projective 4-Space
The exceptional Jordan algebra
In the early 1930s, Pascual Jordan attempted to formalise the algebraic properties of Hermitian matrices. In particular: Hermitian matrices form a real vector space: we can add and subtract Hermiti…
👍
6
🤩
1
🌭
1
Hacker News
Peru's Great Urban Experiment (2023)
Article
,
Comments
Archaeology Magazine
Features - Peru's Great Urban Experiment - Archaeology Magazine - May/June 2023
A millennium ago, the Chimú built a new way oflife in the vast city of Chan Chan
👍
7
🌭
1
Hacker News
HTTP/3 is everywhere but nowhere
Article
,
Comments
Httptoolkit
HTTP/3 is everywhere but nowhere
HTTP/3 has been in development since at least 2016, while QUIC (the protocol beneath it) was first introduced by Google way back in 2013. Both are now...
🤝
12
🌭
3
Hacker News
Artificial photosynthesis directed toward organic synthesis
Article
,
Comments
Nature
Artificial photosynthesis directed toward organic synthesis
Nature Communications - Emulating the concept of natural photosynthesis has long been a focus of chemists in an effort to harness solar light as an energy source using water as an electron donor...
👍
4
🌭
1
Hacker News
Converting C to ASM to specs and then to a working Z/80 Speccy tape
Article
,
Comments
Geoffrey Huntley
Can a LLM convert C, to ASM to specs and then to a working Z/80 Speccy tape? Yes.
✨
Daniel Joyce used the techniques described in this post to port ls to rust via an objdump. You can see the code here: https://github.com/DanielJoyce/ls-rs. Keen, to see more examples - get in contact if you ship something!
Damien Guard nerd sniped me and…
👍
10
😨
4
🥱
3
🌭
2
😱
1
Hacker News
From Languages to Language Sets
Article
,
Comments
Gist
languages.md
GitHub Gist: instantly share code, notes, and snippets.
👍
2
🌭
1
Hacker News
Genomic study: our capacity for language emerged at least 135k years ago
Article
,
Comments
phys.org
Genomic study indicates our capacity for language emerged 135,000 years ago
It is a deep question, from deep in our history: when did human language as we know it emerge? A new survey of genomic evidence suggests our unique language capacity was present at least 135,000 years ...
👍
9
⚡
2
🌭
1
Hacker News
Stupid Smart Pointers in C
Article
,
Comments
Kevinalbs
Stupid Smart Pointers in C
👌
9
🌭
1
Hacker News
Raspberry Pi RP2350 Now Available for Purchase, Stacked Memory Variant Coming
Article
,
Comments
Phoronix
Raspberry Pi RP2350 Now Available For Purchase, Stacked Memory Variant Coming Soon
Raspberry Pi last year announced the RP2350 second-generation micro-controller that debuted within their $5 Raspberry Pi Pico 2 single board computer
👍
8
🤔
1
🌭
1
Hacker News
Undergraduate Disproves 40-Year-Old Conjecture, Invents New Kind of Hash Table
Article
,
Comments
WIRED
Undergraduate Disproves 40-Year-Old Conjecture, Invents New Kind of Hash Table
A young computer scientist and two colleagues show that searches within data structures called hash tables can be much faster than previously deemed possible.
🔥
36
🤓
4
😁
2
🌭
2
🤣
2
🤯
1
💩
1
Hacker News
Compression of Spectral Images Using Spectral JPEG XL
Article
,
Comments
❤
2
🌭
1
Hacker News
Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours
Article
,
Comments
Tom's Hardware
Akira ransomware can be cracked with 16 RTX 4090 GPUs in around ten hours — new counterattack breaks encryption
The freshest Akira variant uses old-timey encryption method vulnerable to brute-force methods
❤
30
🤯
9
🔥
3
🤔
3
🌭
1
🤓
1
Hacker News
Chaos in the Cloudflare Lisbon Office
Article
,
Comments
The Cloudflare Blog
Chaos in Cloudflare’s Lisbon office: securing the Internet with wave motion
Cloudflare is now using a wall of waves in our Lisbon, Portugal office to create entropy and strengthen Internet security, turning liquid chaos into secure, unpredictable encryption.
❤
9
🥱
7
💩
2
😁
1
🌭
1
Hacker News
Ogres Are Cool
Article
,
Comments
London Review of Books
Colin Burrow · Ogres are cool: Grimm Tales
The only rule of a tale is that everything gets used, even apparently superfluous details – though you’re allowed...
🔥
4
🥱
2
🌭
1
Hacker News
zlib-ng: zlib replacement with optimizations for "next generation" systems
Article
,
Comments
GitHub
GitHub - zlib-ng/zlib-ng: zlib replacement with optimizations for "next generation" systems.
zlib replacement with optimizations for "next generation" systems. - zlib-ng/zlib-ng
👍
3
🌭
1
Hacker News
Extracting content from an LCP "protected" ePub
Article
,
Comments
Terence Eden’s Blog
Extracting content from an LCP "protected" ePub
As Cory Doctorow once said "Any time that someone puts a lock on something that belongs to you but won't give you the key, that lock's not there for you." But here's the thing with the LCP DRM scheme; they do give you the key! As I've written about previously…
❤
15
👍
2
👏
2
🥰
1
🌭
1
Hacker News
Show HN: EnkiTask: Lightweight Project Management for Freelancers
Article
,
Comments
👍
1
🌭
1
Hacker News
Deep Learning Is Not So Mysterious or Different
Article
,
Comments
arXiv.org
Deep Learning is Not So Mysterious or Different
Deep neural networks are often seen as different from other model classes by defying conventional notions of generalization. Popular examples of anomalous generalization behaviour include benign...
👍
8
❤
3
🌭
1
TWeb.init({scrollToPost:'hackernewslive/199476'});