Hacker News
@hackernewslive
24.6K
subscribers
217K
links
Download Telegram
Join
Hacker News
24.6K subscribers
Hacker News
The Early History of F# [pdf]
Article
,
Comments
2
👍
100%
0
👎
0%
Hacker News
Ask HN: What should a systems/low-level software engineer know?
Article,
Comments
3
👍
100%
0
👎
0%
Hacker News
EU Article 13 is almost finished – and it will change the internet as we know it
Article
,
Comments
Julia Reda
Article 13 is almost finished – and it will change the internet as we know it
2
👍
33%
4
👎
67%
Hacker News
List of hilarious and useless things at CES
Article
,
Comments
threader.app
A thread written by @edzitron
Starting off my @internetofshit coverage for CES this year with whatever the fuck this is https://t.co/TheuWacCSz
4
👍
100%
0
👎
0%
Hacker News
Apple publishes language server implementation for Swift and C-family languages
Article
,
Comments
GitHub
GitHub - swiftlang/sourcekit-lsp: Language Server Protocol implementation for Swift and C-based languages
Language Server Protocol implementation for Swift and C-based languages - swiftlang/sourcekit-lsp
3
👍
100%
0
👎
0%
Hacker News
Year-Long, Undercover Plot to Blow Up Eve Online's Most Notorious Space Station
Article
,
Comments
Kotaku
The Year-Long, Undercover Plot To Blow Up EVE Online's Most Notorious Space Station
In theory, anything can happen in EVE Online, but some things are considered impossible. Well, last month, one of the “impossible” things happened: The destruction of the game’s first-ever Keepstar battlestation, which was kept in a wormhole. Of course, it…
9
👍
90%
1
👎
10%
Hacker News
Metasploit Framework 5.0 Released
Article
,
Comments
1
👍
100%
0
👎
0%
Hacker News
How I Organize My GitHub Repositories
Article
,
Comments
Medium
How I Organize my GitHub Repositories
And why you should do this too
1
👍
33%
2
👎
67%
Hacker News
uLisp: Lisp for microcontrollers
Article
,
Comments
0
👍
0%
1
👎
100%
Hacker News
How to Be an Expert in a Changing World (2014)
Article
,
Comments
👍
👎
Hacker News
Privilege escalation through Kubernetes dashboard
Article
,
Comments
Sysdig
CVE-2018-18264 Privilege escalation through Kubernetes dashboard
Kubernetes dashboard vulnerability CVE-2018-18264 exposes secrets to unauthenticated users. Learn how to monitor privilege escalation on Kubernetes.
3
👍
75%
1
👎
25%
Hacker News
“The Book of Why” by Pearl and Mackenzie
Article
,
Comments
👍
👎
Hacker News
PHP Apprentice – an online, open-source book for learning PHP
Article
,
Comments
Phpapprentice
PHP Apprentice
An online book for learning PHP
0
👍
0%
2
👎
100%
Hacker News
More Startups Have an Unfamiliar Message for Venture Capitalists: Get Lost
Article
,
Comments
NY Times
More Start-Ups Have an Unfamiliar Message for Venture Capitalists: Get Lost
Frustrated with the perverse incentives of fast growth, founders are criticizing the investment model that built the tech industry as we know it.
6
👍
75%
2
👎
25%
Hacker News
Ottoman-Era Photographs Take on New Meaning in Their Digital Life (2018)
Article
,
Comments
Getty Iris
Ottoman-Era Photographs Take on New Meaning in Their Digital Life
A look at nineteenth-century Turkey through photographs.
1
👍
100%
0
👎
0%
Hacker News
Unity's response to Improbable’s blog post
Article
,
Comments
Unity Blog
Our response to Improbable’s blog post (and why you can keep working on your SpatialOS game) | Unity Blog
Improbable published a blog post regarding their relationship with Unity earlier today. Improbable’s blog is incorrect. We terminated our relationship with Improbable due to a failed negotiation with them after they violated our Terms of Service. We’ve made…
2
👍
100%
0
👎
0%
Hacker News
Mathematicians Seal Back Door to Breaking RSA Encryption
Article
,
Comments
Quanta Magazine
Mathematicians Seal Back Door to Breaking RSA Encryption
Digital security depends on the difficulty of factoring large numbers. A new proof shows why one method for breaking digital encryption won’t work.
6
👍
100%
0
👎
0%
Hacker News
Writing a Self-Mutating x86_64 C Program (2013)
Article
,
Comments
Shanetully
Writing a Self-Mutating x86_64 C Program
Ramblings of a software engineer
👍
👎
Hacker News
Donald Knuth – The Joy of Asymptotics (2000) [video]
Article
,
Comments
YouTube
Stanford Lecture: Donald Knuth - "The Joy of Asymptotics" (May 30, 2000)
May 30, 2000
Professor Knuth is the Professor Emeritus at Stanford University. Dr. Knuth's classic programming texts include his seminal work The Art of Computer Programming, Volumes 1-3, widely considered to be among the best scientific writings of the…
3
👍
100%
0
👎
0%
Hacker News
Google Demanded T-Mobile, Sprint Not Sell Google Fi Customers' Location Data
Article
,
Comments
Vice
Google Demanded That T-Mobile, Sprint Not Sell Google Fi Customers' Location Data
Google’s phone, text, and data service relies on infrastructure provided by T-Mobile and Sprint. A Motherboard investigation found both telcos selling customers’ location data that ultimately ended up in the hands of bounty hunters.
0
👍
0%
1
👎
100%
Hacker News
The Weight I Carry
Article
,
Comments
The Atlantic
My 460-Pound Self
What it’s like to be too big in America
0
👍
0%
5
👎
100%
TWeb.init({scrollToPost:'hackernewslive/43822'});