Hacker News
@hackernewslive
24.8K
subscribers
217K
links
Download Telegram
Join
Hacker News
24.8K subscribers
Hacker News
Netflix’s biggest competition isn’t sleep, it’s YouTube
Article
,
Comments
VentureBeat
Netflix’s biggest competition isn’t sleep — It’s YouTube
Netflix insists sleep is its biggest competitor. But YouTube may actually be a greater threat in the battle for India‘s users.
1
👍
50%
1
👎
50%
Hacker News
Making Penicillin at Home
Article
,
Comments
1
👍
50%
1
👎
50%
Hacker News
“Plus Codes” by Google
Article
,
Comments
GitHub
GitHub - google/open-location-code: Open Location Code is a library to generate short codes, called "plus codes", that can be used…
Open Location Code is a library to generate short codes, called "plus codes", that can be used as digital addresses where street addresses don't exist. - google/open-location-code
3
👍
100%
0
👎
0%
Hacker News
What These Medical Journals Don’t Reveal: Top Doctors’ Ties to Industry
Article
,
Comments
Nytimes
What These Medical Journals Don’t Reveal: Top Doctors’ Ties to Industry
Academic research publications rely on doctors to voluntarily disclose their payments from drug and health companies in a lax reporting system some say is broken.
👍
👎
Hacker News
When Your Profiler Lies
Article
,
Comments
Random ASCII - tech blog of Bruce Dawson
When Your Profiler Lies
Last week I wrote about the performance consequences of inadvertently loading gdi32.dll into processes that are created and destroyed at very high rates. This week I want to share some techniques f…
👍
👎
Hacker News
XNU target config for Raspberry Pi 3
Article
,
Comments
👍
👎
Hacker News
Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret
Article
,
Comments
Nytimes
Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret (Published 2018)
Dozens of companies use smartphone locations to help advertisers and even hedge funds. They say it’s anonymous, but the data shows how personal it is.
4
👍
100%
0
👎
0%
Hacker News
Marriott’s breach response is so bad, security experts are filling in the gaps
Article
,
Comments
TechCrunch
Marriott’s breach response is so bad, security experts are filling in the gaps — at their own expense
Last Friday, Marriott sent out millions of emails warning of a massive data breach — some 500 million guest reservations had been stolen from its Starwood database. One problem: the email sender’s domain didn’t look like it came from Marriott at all. Marriott…
4
👍
100%
0
👎
0%
Hacker News
“A pattern language” explained (2016)
Article
,
Comments
Permaculture magazine
A Pattern Language Explained
Understanding patterns is a key concept in permaculture. But what are they? How can we 'see' them with systems thinking and how can we apply them? Michael Mehaffy, long time student and colleague of Christopher Alexander, explores this new frontier of design.
👍
👎
Hacker News
Madoff’s Victims Are Close to Getting Their $19B Back
Article
,
Comments
Bloomberg.com
Madoff’s Victims Are Close To Getting Their $19 Billion Back
The decade-long road to recovering cash has been a striking success.
1
👍
50%
1
👎
50%
Hacker News
The -a to -z of Command-Line Options (2003)
Article
,
Comments
1
👍
50%
1
👎
50%
Hacker News
Chess, a Drosophila of reasoning
Article
,
Comments
Science
Chess, a Drosophila of reasoning
The recent world chess championship saw Magnus Carlsen defend his noscript against Fabiano Caruana. But it was not a contest between the two strongest chess players on the planet, only the strongest humans. Soon after I lost my rematch against IBM's Deep Blue…
0
👍
0%
1
👎
100%
Hacker News
Prions, Nearly Indestructible and Universally Lethal, Seed the Eyes of Victims
Article
,
Comments
Scientific American Blog Network
Prions, Nearly Indestructible and Universally Lethal, Seed the Eyes of Victims
Discovery suggests worrying transmission possibilities
3
👍
100%
0
👎
0%
Hacker News
AI assisted code completion for C++
Article
,
Comments
C++ Team Blog
AI-Assisted Code Completion Suggestions Come to C++ via IntelliCode
After reading and writing enough code, you begin to notice certain usage patterns. For example, if a stream is open, it will eventually be closed. More interestingly, if a string is used in the context of an if-statement, it will often be to check if the…
0
👍
0%
1
👎
100%
Hacker News
Why Robot Brains Need Symbols
Article
,
Comments
Nautilus
Why Robot Brains Need Symbols
Nowadays, the words “artificial intelligence” seem to be on practically everyone’s lips, from Elon Musk to Henry Kissinger.…
👍
👎
Hacker News
Nextcloud introduces social features, joins the fediverse
Article
,
Comments
Nextcloud
Nextcloud introduces social features, joins the fediverse - Nextcloud
Today, Nextcloud 15 has been made available. As there is so much new and improved in this release, we have dedicated separate blogs to each main area of improvement. This blog covers a preview of the the brand new Nextcloud Social app, introducing social…
1
👍
100%
0
👎
0%
Hacker News
Tell HN: Aaron Swartz's website is offline
Article,
Comments
3
👍
100%
0
👎
0%
Hacker News
China says rejecting physical cash is illegal amid e-payments popularity
Article
,
Comments
3
👍
100%
0
👎
0%
Hacker News
Alibaba has a voice assistant better than Google’s
Article
,
Comments
MIT Technology Review
Alibaba already has a voice assistant way better than Google’s
In May, Google made quite the splash when it unveiled Duplex, its eerily humanlike voice assistant capable of making restaurant reservations and salon appointments. It seemed to mark a new milestone in speech generation and natural-language understanding…
1
👍
100%
0
👎
0%
Hacker News
Apple Airplay on Raspberry Pi in 7 Easy Steps
Article
,
Comments
App Code Labs
Apple Airplay on Raspberry Pi in 7 Easy Steps - App Code Labs
Want to add Apple Airplay to your existing hifi system? Learn how to turn a Raspberry Pi into an Airplay server. This 7-step guide shows you how.
3
👍
100%
0
👎
0%
Hacker News
Is there an actual Facebook crisis, or media narrative about Facebook crisis?
Article
,
Comments
The Story's Story
Is there an actual Facebook crisis, or media narrative about Facebook crisis?
“Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis” uses the word “crisis” in the headline, but the “crisis” cited seems imaginary: is there …
👍
👎
TWeb.init({scrollToPost:'hackernewslive/41873'});