Hacker News
@hackernewslive
24.7K
subscribers
217K
links
Download Telegram
Join
Hacker News
24.7K subscribers
Hacker News
What is Symplectic Geometry? (2016) [pdf]
Article
,
Comments
1
👍
100%
0
👎
0%
Hacker News
PIA VPN acquired by malware company founded by former Israeli spy
Article
,
Comments
Telegraph
Private Internet Access VPN to be acquired by malware company founded by former Israeli spy
arccompute.com/blog The following article contains quotes and links meant to inform VPN consumers concerning the ownership, affiliations, and past business practices of Kape Technologies (formerly known as Crossrider) in light of their acquisition of Private…
11
👍
79%
3
👎
21%
Hacker News
Inca Road System
Article
,
Comments
6
👍
86%
1
👎
14%
Hacker News
Polytope Model
Article
,
Comments
2
👍
100%
0
👎
0%
Hacker News
Making Swift code extensible through plugins
Article
,
Comments
Swift by Sundell
Making Swift code extensible through plugins | Swift by Sundell
Let’s take a look at a few different ways to add plugin support to a type or library, and how doing so can enable a system to become a lot more decoupled and flexible.
👍
👎
Hacker News
Elinor Ostrom's Principles for Managing a Commons (2011)
Article
,
Comments
👍
👎
Hacker News
The programmer behind the THERAC-25 Fiasco was never found
Article
,
Comments
Twitter
setenv NAME="Benjamin D. Hutchins"
As one of the requirements for the Responsible Conduct of Research course I had to take this semester, I'm doing a short paper about a well-known engineering ethics case study, the Therac-25 fiasco of the 1980s.
1
👍
33%
2
👎
67%
Hacker News
Is true hacking dead? What we lost
Article
,
Comments
Blogspot
Is true hacking dead? What we lost.
Realtime rendering and videogame programming mostly, but I love computer science and visuals in all their forms. This is a notepad of my ideas.
1
👍
17%
5
👎
83%
Hacker News
Yoast SEO plugin for WordPress injects Black Friday adverts without permission
Article
,
Comments
1
👍
100%
0
👎
0%
Hacker News
Go memory ballast: How I learnt to stop worrying and love the heap
Article
,
Comments
1
👍
50%
1
👎
50%
Hacker News
Surveillance Giants [pdf]
Article
,
Comments
Amnesty International
Surveillance giants: How the business model of Google and Facebook threatens human rights - Amnesty International
Google and Facebook help connect the world and provide crucial services to billions. To participate meaningfully in today’s economy and society, and to realize their human rights, people rely on access to the internet—and to the tools Google and Facebook…
1
👍
50%
1
👎
50%
Hacker News
The rise of solar is ‘jeopardising the grid’ and it's a lesson for Australia
Article
,
Comments
ABC News
The rise of solar power is jeopardising the WA energy grid, and it's a lesson for all of Australia
In Western Australia, rooftop solar power has been a runaway success — but it now threatens to jeopardise the stability of the grid itself.
2
👍
40%
3
👎
60%
Hacker News
Bryan Cantrill interviews Arthur Whitney (2009)
Article
,
Comments
queue.acm.org
A Conversation with Arthur Whitney - ACM Queue
When it comes to programming languages, Arthur Whitney is a man of few words. The languages he has designed, such as A, K, and Q, are known for their terse, often cryptic syntax and tendency to use single ASCII characters instead of reserved words. While…
👍
👎
Hacker News
It’s not a zero-sum game for Apple TV+, Netflix, and Disney+
Article
,
Comments
Medium
Everyone’s Wrong About the Streaming Wars
It’s not a zero-sum game for Apple TV+, Netflix, and Disney+
0
👍
0%
5
👎
100%
Hacker News
Taking ML to production with Rust – a 25x speedup
Article
,
Comments
Lpalmieri
Taking ML to production with Rust: a 25x speedup
A personal blog focused on software, Machine Learning and other passing fads.
3
👍
60%
2
👎
40%
Hacker News
How to rewrite it in Rust
Article
,
Comments
Michaelfbryan
How to RiiR
In a previous article we’ve talked about how you can avoid rewriting a library in Rust when you don’t need to. But what about the times when you really do need to?
In most languages you’d need to rewrite the entire library from the ground up, waiting until…
2
👍
100%
0
👎
0%
Hacker News
Millions of SMS messages exposed in database security lapse
Article
,
Comments
TechCrunch
Millions of SMS messages exposed in database security lapse
Exclusive: The exposed database was left unprotected without a password. None of the data was encrypted.
4
👍
80%
1
👎
20%
Hacker News
Django 3.0 Released
Article
,
Comments
4
👍
67%
2
👎
33%
Hacker News
Farmers Are Using Food Waste to Make Electricity
Article
,
Comments
2
👍
67%
1
👎
33%
Hacker News
Head of Chinese research integrity is exposed for scientific fraud
Article
,
Comments
NeuroLogica Blog
Scientific Fraud in China
There is plenty of fraud and corruption in the world, even in the halls of science. No one has a monopoly. But there are some hot spots that deserve specific attention. Recently significant concerns have been raised about the published research of Xuetao…
7
👍
88%
1
👎
13%
Hacker News
Clear backpacks, monitored emails: U.S. students under constant surveillance
Article
,
Comments
the Guardian
Clear backpacks, monitored emails: life for US students under constant surveillance
School shootings have driven a booming school security industry. Parents and students are still grappling with this new surveillance and its impact on a generation of kids
2
👍
29%
5
👎
71%
TWeb.init({scrollToPost:'hackernewslive/64813'});