Quantcast
Channel: Hacker News
Browsing all 25817 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Flaws in deterministic password managers

November 22, 2016Wouldn’t it be nice if your password manager didn’t need a database? Instead of synchronizing a password vault between your devices, you could use the magic of cryptography to...

View Article


Image may be NSFW.
Clik here to view.

Show HN: Java Bullshifier

$...:runStart generating 1 projects> Generating 50 classes> Generating dynamic code> Writing 50 classes> Writing switcher> Writing entrypointsWriting gradle configurationsDone!$$

View Article


Image may be NSFW.
Clik here to view.

NIST’s new password rules – what you need to know

It’s no secret. We’re really bad at passwords. Nevertheless, they aren’t going away any time soon. With so many websites and online applications requiring us to create accounts and think up passwords...

View Article

Image may be NSFW.
Clik here to view.

Keyframes: Delivering scalable, high-quality animations to mobile clients

Reactions are a way for people to more easily express themselves on Facebook. As we began building the feature, we wanted to provide a high-quality experience that felt fun at every step, including how...

View Article

Image may be NSFW.
Clik here to view.

Machine Learning for Everyday Tasks

Machine learning is often thought to be too complicated for everyday development tasks. We often associate it with things like big data, data mining, data science, and artificial intelligence....

View Article


Image may be NSFW.
Clik here to view.

Before You Grow

Startups are defined by growth, but growth isn’t step one in building a great company. If you focus on trying to grow before you make a product people love, you are unlikely to succeed.We’ve said this...

View Article

Image may be NSFW.
Clik here to view.

Talking to users

The idea that startups should talk to users is conventional wisdom. Great founders talk to users, so most founders signal their greatness by making a point that they do it too. But empirically talking...

View Article

Image may be NSFW.
Clik here to view.

Shopify’s Frenzy – Sell to the most loyal customers in a new way

Handle thousands of orders per minute with easeFrenzy is built on Shopify’s highly scalable platform so you can sleep easy knowing your customers will always have a fast, enjoyable experience. Whether...

View Article


Image may be NSFW.
Clik here to view.

Supercapacitors Batteries charges in seconds without degrading

A team of UCF scientists has developed a new process for creating flexible supercapacitors that can store more energy and be recharged more than 30,000 times without degrading.The novel method from the...

View Article


Image may be NSFW.
Clik here to view.

Python at StackOverflow (an Interview with Martijn Pieters)

If you run into a problem with some API or Python code what do you do to solve it? I personally through a few keywords into google, sometimes even before checking the full docs. Why does this work?...

View Article

Image may be NSFW.
Clik here to view.

Engineer? TechOps? Swiftype is hiring

Work at Swiftype Swiftype is a growing team of talented search engineers and experts with a range of experiences and backgrounds. We’re looking for self-motivated and resourceful individuals who will...

View Article

Image may be NSFW.
Clik here to view.

The XSS Game by Google

Cross-site scripting (XSS) bugs are one of the most common and dangerous types of vulnerabilities in Web applications. These nasty buggers can allow your enemies to steal or modify user data in your...

View Article

Image may be NSFW.
Clik here to view.

Elm for the Front End, Right Now

The following article was originally written in July 2015 for the 0.16 release of the Elm programming language. It has been rewritten here in November 2016 to comply with the syntactic and semantic...

View Article


Image may be NSFW.
Clik here to view.

Israeli firm can steal phone data in seconds

A Cellebrite engineer explains the technology used to unlock smartphones and pull dataIt only takes a few seconds for an employee of one of the world's leading hacking companies to take a locked...

View Article

Image may be NSFW.
Clik here to view.

The Challenge of Consciousness

Washington State Historical Society/Art ResourceVirna Haffer: Inside the Mind of Man, circa 1935-1942Is it possible to put some order into our thoughts about consciousness, memory, perception, and the...

View Article


Image may be NSFW.
Clik here to view.

Show HN: Functional programming for modern Fortran

README.mdfunctional-fortranFunctional programming for modern Fortran.Getting startedgit clone https://github.com/wavebitscientific/functional-fortran cd functional-fortran mkdir build cd build cmake...

View Article

Image may be NSFW.
Clik here to view.

The Lua VM, on the Web

FAQAre you really porting the entire Lua VM?Yes: The entire Lua 5.2.4 codebase written in C is compiled to JavaScript here, including a full incremental GC and everything else. It fits in 170K of...

View Article


Image may be NSFW.
Clik here to view.

Statistical Mistakes and How to Avoid Them

Computer scientists in systemsy fields, myself included, aren’t great at using statistics. Maybe it’s because there are so many other potential problems with empirical evaluations that solid...

View Article

Image may be NSFW.
Clik here to view.

The Manhattan Project Fallacy

Google's DeepMind research outfit recently announced that it had defeated a world champion Go player with a new artificial intelligence system. This is an important technical development that should...

View Article

Image may be NSFW.
Clik here to view.

Subgraph OS: Adversary resistant computing platform

Subgraph OS is a desktop computing and communications platform that is designed to be resistant to network-borne exploit and malware attacks. It is also meant to be familiar and easy to use. Even in...

View Article
Browsing all 25817 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>