Hacker News
@hackernewslive
25.2K
subscribers
220K
links
Download Telegram
Join
Hacker News
25.2K subscribers
Hacker News
C possibly gaining support for N-bit integers
Article
,
Comments
The LLVM Project Blog
The New Clang _ExtInt Feature Provides Exact Bitwidth Integer Types
Author: Erich Keane, Compiler Frontend Engineer, Intel Corporation
Earlier this month I finally committed a patch to implement the extended-integer type class, _ExtInt after nearly two and a half years of design and implementation.
7
👍
88%
1
👎
13%
Hacker News
Magic Leap reportedly slashes 1k jobs and steps away from consumer plans
Article
,
Comments
TechCrunch
Magic Leap reportedly slashes 1,000 jobs and steps away from consumer plans
Magic Leap laid off a “number of employees” this morning and announced they were backing away from their consumer ambitions to focus more heavily on selling to enterprise customers.
1
👍
10%
9
👎
90%
Hacker News
Portable Ultrasound Proves a Potent Weapon in the Fight Against Covid-19
Article
,
Comments
IEEE Spectrum
Portable Ultrasound Proves a Potent Weapon in the Fight Against COVID-19
Inexpensive, pocket-size systems are surprising and ubiquitous tech stalwarts
7
👍
78%
2
👎
22%
Hacker News
Build a real-time Twitter clone in 15 minutes with LiveView and Phoenix 1.5
Article
,
Comments
2
👍
67%
1
👎
33%
Hacker News
Understanding BERT and Search Relevance (2019)
Article
,
Comments
OpenSource Connections
Understanding BERT and Search Relevance - OpenSource Connections
This article gives an overview into the opportunities and challenges when applying advanced transformer models such as BERT to search.
👍
👎
Hacker News
Incremental Builds in Gatsby Cloud
Article
,
Comments
Gatsby
What is Gatsby Incremental Builds?
Gatsby is a React-based open source framework with performance, scalability and security built-in. Collaborate, build and deploy 1000x faster with Gatsby Cloud.
1
👍
25%
3
👎
75%
Hacker News
Quarantine work is not remote work
Article
,
Comments
Hanselman
Quarantine work is not Remote work
It's hard. Now, to be clear, if you're working at all in these times, you're ...
8
👍
62%
5
👎
38%
Hacker News
ARM Development for the Office: Unboxing an Ampere EMag Workstation
Article
,
Comments
2
👍
40%
3
👎
60%
Hacker News
Paketo: Modular Buildpacks in Go
Article
,
Comments
1
👍
50%
1
👎
50%
Hacker News
Show HN: Tail Recursion Optimization for the JVM
Article
,
Comments
GitHub
GitHub - Sipkab/jvm-tail-recursion: Optimizer library for tail recursive calls in Java bytecode
Optimizer library for tail recursive calls in Java bytecode - Sipkab/jvm-tail-recursion
3
👍
75%
1
👎
25%
Hacker News
CS Unplugged – Computer Science without a computer
Article
,
Comments
5
👍
83%
1
👎
17%
Hacker News
Is This the End of Airbnb?
Article
,
Comments
WIRED UK
Is this the end of Airbnb?
Hosts are calling it the Airbnb apocalypse. But it’s more akin to an enema
13
👍
87%
2
👎
13%
Hacker News
Out of the Crisis Podcast with Sam Altman, Mark Cuban
Article
,
Comments
Startuplessonslearned
Out of the Crisis
Over the past few weeks, I have recorded a series of conversations with people leading the way out of this mess. They range from prominent ...
1
👍
33%
2
👎
67%
Hacker News
Flaw in iPhone, iPads may have allowed hackers to steal data for years
Article
,
Comments
Reuters
Flaw in iPhone, iPads may have allowed hackers to steal data for years
WASHINGTON/SAN FRANCISCO (Reuters) - Apple Inc is planning to fix a flaw that a security firm said may have left more than half a billion iPhones vulnerable to hackers.
10
👍
83%
2
👎
17%
Hacker News
Immune systems of adults 'remember' germs to which they’ve never been exposed
Article
,
Comments
News Center
Immune systems of healthy adults 'remember' germs to which they've never been exposed, Stanford study finds
A new study shows that, contrary to established dogma, key immune cells in healthy adults somehow acquire "memory" of microbes that have never entered their bodies.
5
👍
83%
1
👎
17%
Hacker News
What end-to-end encryption should look like
Article
,
Comments
Jitsi
End to End Encryption Calls in Jitsi Meet Demo | Jitsi
Check out our progress in end-to-end encryption calls in Jitsi. Give us your crypto knowledge feedback with the code and learn how to demo it here.
6
👍
86%
1
👎
14%
Hacker News
Team Fortress 2 Source Code Leaked
Article
,
Comments
TechRadar
Team Fortress 2 source code has leaked, and you can apparently get malware by playing
Valve's source code for Team Fortress 2 and Counter-Strike: Global Offensive has leaked, leading to some potentially nasty attacks.
18
👍
100%
0
👎
0%
Hacker News
Are Ideas Getting Harder to Find?
Article
,
Comments
www.aeaweb.org
Are Ideas Getting Harder to Find?
(April 2020) - Long-run growth in many models is the product of two terms: the effective number of researchers and their research productivity. We present evidence from various industries, products, and firms showing that research effort is rising substantially…
4
👍
100%
0
👎
0%
Hacker News
Mental Model Fallacy (2018)
Article
,
Comments
Commonplace - The Commoncog Blog
The Mental Model Fallacy
The mental model fallacy is that it’s worth it to read denoscriptions of mental models, written and aggregated by non-practitioners, in the pursuit of self-improvement and success. It isn't.
0
👍
0%
1
👎
100%
Hacker News
Specification gaming: the flip side of AI ingenuity
Article
,
Comments
Google DeepMind
Specification gaming: the flip side of AI ingenuity
Specification gaming is a behaviour that satisfies the literal specification of an objective without achieving the intended outcome. We have all had experiences with specification gaming, even if...
2
👍
100%
0
👎
0%
Hacker News
AOL Moloch: open-source, large scale, packet-capturing, indexing database system
Article
,
Comments
4
👍
40%
6
👎
60%
TWeb.init({scrollToPost:'hackernewslive/74009'});