Quantcast
Channel: Hacker News
Browsing all 25817 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

LiChess: Learn from your mistakes

Today we're delighted to announce a new and - dare I say - revolutionary feature. Are you ready to dramatically improve your chess? Then read on.This new feature takes your hand and walks you through...

View Article


Image may be NSFW.
Clik here to view.

Gorilla: A Fast, Scalable, In-Memory Time Series Database (2015) [pdf]

Download PDF

View Article


Image may be NSFW.
Clik here to view.

A Long Ago Christmas in the Most Remote Place on Earth

It is easy to be cynical, but sometimes we should stop and ask ourselves: How far would we go to celebrate the holidays?At their heart, the holidays are about finding ways to make imperfect situations...

View Article

Image may be NSFW.
Clik here to view.

Ask HN: What Are the Best Current Methods to Delete Yourself from the Internet?

For those of us interested in dropping off the grid, what are the best current methods of removal of information from search engines and servers that host information about you, whether known by you or...

View Article

Image may be NSFW.
Clik here to view.

I Know What You Download on BitTorrent

Torrent downloads and distributions for IP 46.30.211.136DenmarkCopenhagenOne.com A/S 46.30.211.136 is your IP address.Computers connected to a network are assigned a unique number known as IP Address....

View Article


Image may be NSFW.
Clik here to view.

The memory app – instant recall of everything anywhere

THE MEMORY APPThe memory app gives you instant recall of everything, anywhere… on your mobile phone.Ever wished you had a perfect memory?Ever had problems finding where you filed the things you were...

View Article

Image may be NSFW.
Clik here to view.

Why Constant-Time Crypto?

In 1996, Paul Kocher published a novel attack on RSA, specifically on RSA implementations, that extracted information on the private key by simply measuring the time taken by the private key operation...

View Article

Image may be NSFW.
Clik here to view.

The Locust Economy (2013)

Last week, I figured out that I am a part-time locust. Here’s how it happened.I was picking the brain of a restauranteur for insight into things like Groupon. He confirmed what we all understand in the...

View Article


Image may be NSFW.
Clik here to view.

Teaching Deep Convolutional Neural Networks to Play Go [pdf]

Download PDF

View Article


Image may be NSFW.
Clik here to view.

Show HN: TurboHist: Turbo Histogram Construction

README.md~1.2 clocks per byte100% C (& C++ compatible) without inline assemblyBoth 32 and 64 bits supportedPortable scalar functions faster than SIMD functionsMore than 3 times faster than naive...

View Article

Image may be NSFW.
Clik here to view.

How We Got from Doc Brown to Walter White

At the start of the fourth season of Breaking Bad, Walter White angrily watches an inexperienced meth cook make his trademark blue meth. Walter is afraid that mob boss Gus Fring is going to kill him,...

View Article

Image may be NSFW.
Clik here to view.

Autovpn – Script to Create an OpenVPN Endpoint on AWS

README.mdScript that allows the easy creation of OpenVPN endpoints in any AWS region. To create a VPN endpoint is done with a single command takes ~3 minutes. It will create a VPC with proper security...

View Article

Image may be NSFW.
Clik here to view.

Information Geometry

Information Geometry John Baez February 3, 2016 Information geometry is the study of 'stochastic manifolds', which are spaces where each point is a hypothesis about some state of affairs. This...

View Article


Image may be NSFW.
Clik here to view.

Usenet Computer YArchive

Computer Architecture The prospects for 128 bit processors (John R. Mashey) [8913 bytes]64 bit processors: history and rationale (John R. Mashey) [32401 bytes]AMD64 (Linus Torvalds; Terje Mathisen)...

View Article

Image may be NSFW.
Clik here to view.

Tor at the Heart: OnionShare

During the month of December, we're highlighting other organizations and projects that rely on Tor, build on Tor, or are accomplishing their missions better because Tor exists. Check out our blog each...

View Article


Image may be NSFW.
Clik here to view.

Writing web applications using only the Go Standard Library

Introduction Covered in this tutorial:Creating a data structure with load and save methodsUsing the net/http package to build web applicationsUsing the html/template package to process HTML...

View Article

Image may be NSFW.
Clik here to view.

Deep Learning Enables You to Hide Screen When Your Boss Is Approaching

IntroductionWhen you are working, you have browsed information that is not relevant to your work, haven’t you?I feel awkward when my boss is creeping behind. Of course, I can switch the screen in a...

View Article


Image may be NSFW.
Clik here to view.

The Scientist and Engineer's Guide to Digital Signal Processing (1997)

640 Pages, Hardcover Over 500 graphs and illustrationsClear explanations Very readable - low math - many examplesAll the classic DSP techniques Convolution, Recursion, Fourier Analysis...Easy to use...

View Article

Image may be NSFW.
Clik here to view.

Cyanogen services shutting down

As part of the ongoing consolidation of Cyanogen, all services and Cyanogen-supported nightly builds will be discontinued no later than 12/31/16. The open source project and source code will remain...

View Article

Image may be NSFW.
Clik here to view.

Runners and musicians have better-connected brains than the rest of us

If you’re thinking about taking up running as your New Year’s resolution and still need some convincing, consider this: MRI scans reveal that endurance runners’ brains have greater functional...

View Article
Browsing all 25817 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>