Hacker News
@hackernewslive
24.8K
subscribers
218K
links
Download Telegram
Join
Hacker News
24.8K subscribers
Hacker News
Tรคnzer: The lovable web server framework for Tcl
Article
,
Comments
๐ฅด
5
๐
4
โค
1
๐ญ
1
Hacker News
A Facebook Insider's Exposรฉ Alleges Bad Behavior at the Top
Article
,
Comments
web.archive.org
Book Review: โCareless People,โ by Sarah Wynn-Williams
โCareless People,โ a memoir by a former Facebook executive, portrays feckless company leaders cozying up to authoritarian regimes.
๐คฏ
16
๐คก
10
๐
5
๐ฑ
2
๐
1
๐ญ
1
๐ฟ
1
Hacker News
Checkers written in Rust and exported to WASM
Article
,
Comments
๐ฉ
12
๐
8
๐คฎ
1
๐คก
1
๐ญ
1
Hacker News
Recommendations for designing magic numbers of binary file formats
Article
,
Comments
๐
3
๐ญ
1
Hacker News
Meta puts stop on promotion of tell-all book by former employee
Article
,
Comments
the Guardian
Meta puts stop on promotion of tell-all book by former employee
Social media company wins emergency arbitration ruling on book, Careless People by Sarah Wynn-Williams
๐คฌ
33
๐
4
๐
3
๐
2
๐
1
๐คก
1
๐ญ
1
๐
1
Hacker News
The exceptional Jordan algebra (2020)
Article
,
Comments
Complex Projective 4-Space
The exceptional Jordan algebra
In the early 1930s, Pascual Jordan attempted to formalise the algebraic properties of Hermitian matrices. In particular: Hermitian matrices form a real vector space: we can add and subtract Hermitiโฆ
๐
6
๐คฉ
1
๐ญ
1
Hacker News
Peru's Great Urban Experiment (2023)
Article
,
Comments
Archaeology Magazine
Features - Peru's Great Urban Experiment - Archaeology Magazine - May/June 2023
A millennium ago, the Chimรบ built a new way oflife in the vast city of Chan Chan
๐
7
๐ญ
1
Hacker News
HTTP/3 is everywhere but nowhere
Article
,
Comments
Httptoolkit
HTTP/3 is everywhere but nowhere
HTTP/3 has been in development since at least 2016, while QUIC (the protocol beneath it) was first introduced by Google way back in 2013. Both are now...
๐ค
12
๐ญ
3
Hacker News
Artificial photosynthesis directed toward organic synthesis
Article
,
Comments
Nature
Artificial photosynthesis directed toward organic synthesis
Nature Communications - Emulating the concept of natural photosynthesis has long been a focus of chemists in an effort to harness solar light as an energy source using water as an electron donor...
๐
4
๐ญ
1
Hacker News
Converting C to ASM to specs and then to a working Z/80 Speccy tape
Article
,
Comments
Geoffrey Huntley
Can a LLM convert C, to ASM to specs and then to a working Z/80 Speccy tape? Yes.
โจ
Daniel Joyce used the techniques described in this post to port ls to rust via an objdump. You can see the code here: https://github.com/DanielJoyce/ls-rs. Keen, to see more examples - get in contact if you ship something!
Damien Guard nerd sniped me andโฆ
๐
10
๐จ
4
๐ฅฑ
3
๐ญ
2
๐ฑ
1
Hacker News
From Languages to Language Sets
Article
,
Comments
Gist
languages.md
GitHub Gist: instantly share code, notes, and snippets.
๐
2
๐ญ
1
Hacker News
Genomic study: our capacity for language emerged at least 135k years ago
Article
,
Comments
phys.org
Genomic study indicates our capacity for language emerged 135,000 years ago
It is a deep question, from deep in our history: when did human language as we know it emerge? A new survey of genomic evidence suggests our unique language capacity was present at least 135,000 years ...
๐
9
โก
2
๐ญ
1
Hacker News
Stupid Smart Pointers in C
Article
,
Comments
Kevinalbs
Stupid Smart Pointers in C
๐
9
๐ญ
1
Hacker News
Raspberry Pi RP2350 Now Available for Purchase, Stacked Memory Variant Coming
Article
,
Comments
Phoronix
Raspberry Pi RP2350 Now Available For Purchase, Stacked Memory Variant Coming Soon
Raspberry Pi last year announced the RP2350 second-generation micro-controller that debuted within their $5 Raspberry Pi Pico 2 single board computer
๐
8
๐ค
1
๐ญ
1
Hacker News
Undergraduate Disproves 40-Year-Old Conjecture, Invents New Kind of Hash Table
Article
,
Comments
WIRED
Undergraduate Disproves 40-Year-Old Conjecture, Invents New Kind of Hash Table
A young computer scientist and two colleagues show that searches within data structures called hash tables can be much faster than previously deemed possible.
๐ฅ
36
๐ค
4
๐
2
๐ญ
2
๐คฃ
2
๐คฏ
1
๐ฉ
1
Hacker News
Compression of Spectral Images Using Spectral JPEG XL
Article
,
Comments
โค
2
๐ญ
1
Hacker News
Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours
Article
,
Comments
Tom's Hardware
Akira ransomware can be cracked with 16 RTX 4090 GPUs in around ten hours โ new counterattack breaks encryption
The freshest Akira variant uses old-timey encryption method vulnerable to brute-force methods
โค
30
๐คฏ
9
๐ฅ
3
๐ค
3
๐ญ
1
๐ค
1
Hacker News
Chaos in the Cloudflare Lisbon Office
Article
,
Comments
The Cloudflare Blog
Chaos in Cloudflareโs Lisbon office: securing the Internet with wave motion
Cloudflare is now using a wall of waves in our Lisbon, Portugal office to create entropy and strengthen Internet security, turning liquid chaos into secure, unpredictable encryption.
โค
9
๐ฅฑ
7
๐ฉ
2
๐
1
๐ญ
1
Hacker News
Ogres Are Cool
Article
,
Comments
London Review of Books
Colin Burrow ยท Ogres are cool: Grimm Tales
The only rule of a tale is that everything gets used, even apparently superfluous details โ though youโre allowed...
๐ฅ
4
๐ฅฑ
2
๐ญ
1
Hacker News
zlib-ng: zlib replacement with optimizations for "next generation" systems
Article
,
Comments
GitHub
GitHub - zlib-ng/zlib-ng: zlib replacement with optimizations for "next generation" systems.
zlib replacement with optimizations for "next generation" systems. - zlib-ng/zlib-ng
๐
3
๐ญ
1
Hacker News
Extracting content from an LCP "protected" ePub
Article
,
Comments
Terence Edenโs Blog
Extracting content from an LCP "protected" ePub
As Cory Doctorow once said "Any time that someone puts a lock on something that belongs to you but won't give you the key, that lock's not there for you." But here's the thing with the LCP DRM scheme; they do give you the key! As I've written about previouslyโฆ
โค
15
๐
2
๐
2
๐ฅฐ
1
๐ญ
1