Quantcast
Channel: Hacker News
Browsing all 25817 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

GraphicsMagick Image Processing System

Check http://www.GraphicsMagick.org/ for the latest version of this page.GraphicsMagick is the swiss army knife of image processing. Comprised of 267K physical lines (according to David A. Wheeler's...

View Article


Image may be NSFW.
Clik here to view.

A Map of the World Won Japan’s Prestigious Design Award

The 2016 Good Design Award results were announced recently with awards going to over 1000 entries in several different categories. But the coveted Grand Award of Japan’s most well-known design award,...

View Article


Image may be NSFW.
Clik here to view.

AtomBombing: A Code Injection That Bypasses Current Security Solutions

Our research team has uncovered new way to leverage mechanisms of the underlying Windows operating system in order to inject malicious code. Threat actors can use this technique, which exists by design...

View Article

Image may be NSFW.
Clik here to view.

Thomas Piketty's Capital in the 21st Century, in 20 minutes [video]

Piketty's bestselling economics book is seismic, a vital infusion of data into the ideological debate over economics -- but it's also 700 pages long. That's not because the argument is difficult to...

View Article

Image may be NSFW.
Clik here to view.

ESPN Loses 621,000 Subscribers; Worst Month in Company History

The biggest business story in American sports this fall isn't the declining NFL ratings or anything that's happening on the field, court, or ice, it's the collapse in ESPN subscribers, which reflect a...

View Article


Image may be NSFW.
Clik here to view.

Total Nightmare: USB-C and Thunderbolt 3

Did you buy the new MacBook or MacBook Pro? Maybe the Google Pixel? You’re about to enter a world of confusion thanks to those new “USB-C” ports. See, that simple-looking port hides a world of...

View Article

Image may be NSFW.
Clik here to view.

Strategies of Human Mating (2006) [pdf]

Download PDF

View Article

Image may be NSFW.
Clik here to view.

Facebook Peering

About FacebookFounded in February 2004, Facebook is a social utility that helps people communicate more efficiently with their friends, family and coworkers. The company develops technologies that...

View Article


Image may be NSFW.
Clik here to view.

ICANN’s First Test of Accountability

Last month, in a much heralded international event, the agreement that ICANN (Internet Corporation for Assigned Names and Numbers) held with the United States Department of Commerce was permitted to...

View Article


Image may be NSFW.
Clik here to view.

Dear Matt Mullenweg: An Open Letter from Wix.com’s CEO Avishai Abrahami

Dear Matt,We were all very surprised by your post, as you have so many claims against us. Wow, dude I did not even know we were fighting.First you say we have been taking from the open source community...

View Article

Image may be NSFW.
Clik here to view.

Doubts About the Promised Bounty of Genetically Modified Crops

Figures from the United States Department of Agriculture show herbicide use skyrocketing in soybeans, a leading G.M. crop, growing by two and a half times in the last two decades, at a time when...

View Article

Image may be NSFW.
Clik here to view.

Adaptive Hardware: Context Aware Interfaces (2013)

What concept could interest the Microsoft Applied Sciences Group for a decade? Adaptive hardware: input devices that can change visually, and even potentially physically, based upon the relevant...

View Article

Image may be NSFW.
Clik here to view.

Don’t go to art school (2013)

After Thomas MoranI’ve had it.I will no longer encourage aspiring artists to attend art school. I just won’t do it. Unless you’re given a full ride scholarship (or have parents with money to burn),...

View Article


Image may be NSFW.
Clik here to view.

DMCA exemptions for modifications and research on your vehicle come into effect

Hoist your wrenches into the air, folks. As of today, October 28, you can now hack, repair, and conduct security research on your own car—or tractor!—without risking jail time for copyright...

View Article

Image may be NSFW.
Clik here to view.

Show HN: Fast Style Transfer in TensorFlow

README.mdFast Style Transfer in TensorFlowAdd famous painting styles to any photo in a fraction of a second! You can even style videos! It takes 100ms on a 2015 Titan X to style the MIT Stata Center...

View Article


Image may be NSFW.
Clik here to view.

Wssdl – WireShark-Specific Dissector Language

README.mdWireShark-Specific Dissector Languagewssdl.packet { message : u8(); definition : i32(); done : utf8z(); easy : ipv4(); }What is this?wssdl is a domain specific language on top of lua built...

View Article

Image may be NSFW.
Clik here to view.

Django SQL Explorer

README.rstDjango SQL ExplorerSQL Explorer aims to make the flow of data between people fast, simple, and confusion-free.Quickly write and share SQL queries in a simple, usable SQL editor, preview the...

View Article


Image may be NSFW.
Clik here to view.

The Checklist (2007)

If a new drug were as effective at saving lives as Peter Pronovost’s checklist, there would be a nationwide marketing campaign urging doctors to use it.Credit Illustration by Yan NascimbeneThe damage...

View Article

Image may be NSFW.
Clik here to view.

Social Log-Ins – Security Issues and Common Mistakes

One of the most common reasons why software developers and architects add a backend to their frontend(s) is the need for user management. In order for user management to work, signup and sign in...

View Article

Image may be NSFW.
Clik here to view.

A Silent Cause of Bad Business Decisions

What’s going on when smart, analytical leaders make awful decisions? It turns out good logic and data aren’t enough to guarantee good decisions. Here’s how to spot bad reasoning and how to avoid...

View Article
Browsing all 25817 articles
Browse latest View live