Quantcast
Channel: Hacker News
Browsing all 737 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

SoundCloud Command-Line Client

README.mdThe next generation SoundCloud client. Without all these stupid CSS files. Runs on OSX and Linux.This hack was built at the Music Hack Day Stockholm 2013.RequirementsRuby (1.9)Portaudio...

View Article


Image may be NSFW.
Clik here to view.

The Internet's Own Boy: The Story of Aaron Swartz [video]

Internet Archive's in-browser video player requires JavaScript to be enabled. It appears your browser does not have it turned on. Please see your browser settings for this feature.something has gone...

View Article


Image may be NSFW.
Clik here to view.

OnionShare: securely and anonymously share a file of any size

Download OnionShare 0.3devWindowsOnionShare for WindowsPGP signatureMac OS XOnionShare for Mac OS XPGP signatureLinuxOnionShare for Debian, Ubuntu, etc.PGP signatureOnionShare for Red Hat, Fedora,...

View Article

Image may be NSFW.
Clik here to view.

Mattermark Has Raised $2M in Our Second Seed Round

In January I selected a dozen investors we wanted to work with and pitched them on our Series A. I quickly discovered expectations for a B2B Series A were $1.5M in annual revenue run rate — we were...

View Article

Image may be NSFW.
Clik here to view.

How I Start: Erlang

IntroErlang releases are a bit like magnets. Everyone who thinks about them shares the same thought: f**king releases, how do they work?Fortunately, since the years of Emakefiles, reltool and systools,...

View Article


Image may be NSFW.
Clik here to view.

Startups from 2010: Acquired, Pivoted or Still Going?

Editor's Note:This is one of the longest posts I've made - in length and duration. It's said that one year in the life of a startup is the equivalent of dog years when compared to more established...

View Article

Image may be NSFW.
Clik here to view.

How you will not uncover Satoshi

Computer forensics is the science of finding evidence in computers and digital documents, and when a hacker perform forensics, better be prepared for the unknown. Satoshi did many things in order to...

View Article

Image may be NSFW.
Clik here to view.

Google’s Balloon Internet Experiment, One Year Later

A Loon balloon ascends to the stratosphere and heads toward Google’s partner school, Linoca Gayoso Castelo Branco, where students wait for the arrival of the Internet. Photo: Courtesy of GoogleEarlier...

View Article


Image may be NSFW.
Clik here to view.

GET /vehicles/{id}/command/honk_horn

never mind... the current version (5.8) of the response has that info: "charger_phases":3here is the response of my car:{ "charging_state":"Charging","charge_limit_soc":90, "charge_limit_soc_std":90,...

View Article


Image may be NSFW.
Clik here to view.

RFC 7258 – Pervasive Monitoring Is an Attack

RFC 7258 - Pervasive Monitoring Is an Attack[Docs] [txt|pdf] [draft-farrell-per...] [Diff1] [Diff2]BEST CURRENT PRACTICE Internet Engineering Task Force (IETF) S. Farrell Request for Comments: 7258...

View Article

Image may be NSFW.
Clik here to view.

Google Trends: Hacker News vs. Slashdot

Arabic — العربية‎Bengali — বাংলাBulgarian — българскиCatalan — CatalàChinese (Hong Kong) — 中文 (香港)Chinese (Simplified) — 中文(简体)Chinese (Traditional) — 中文 (繁體)Croatian — HrvatskiCzech — ČeštinaDanish —...

View Article

Image may be NSFW.
Clik here to view.

Job interviews go both ways (2011)

Note: this is a post from 2011. It used to be on the IndexTank blog which no longer exists, so I’m putting it up here. –When I interview a candidate here at IndexTank, I take it very seriously and try...

View Article

Image may be NSFW.
Clik here to view.

New Y Combinator Website

Our website got a facelift.The content is pretty much the same. Since the old site was mostly text, I did my best to just make that text easier to digest and hopefully entice people to get through more...

View Article


Image may be NSFW.
Clik here to view.

Chumby is back

As you know, the chumby systems have been running in a very limited mode for the last year or so.  This followed the acquisition of the Chumby property and rights by Blue Octy, LLC, a company I formed...

View Article

Image may be NSFW.
Clik here to view.

JavaScript Modules

JavaScript ModulesThe next version of JavaScript comes with a module system heavily inspired by Node.js modules.Here’s how it works.We’re going to build a simple asap module, which lets you schedule...

View Article


Image may be NSFW.
Clik here to view.

Things You Should Know About Tor

We posted last week about the Tor Challenge and why everyone should use Tor. Since we started our Tor Challenge two weeks ago we have signed up over 1000 new Tor relays. But it appears that there are...

View Article

Image may be NSFW.
Clik here to view.

Why Everyone Should be Concerned By the Seizure of MyRedBook.com

Last week, an online community for sex workers disappeared from the Internet. Visit SFRedbook.com, MyPinkBook.com, or MyRedBook.com right now, and you’ll only find the seals of the law enforcement...

View Article


Image may be NSFW.
Clik here to view.

A Way to Reverse Coronary Artery Disease? [pdf]

%PDF-1.5 %âãÏÓ 104 0 obj <</Linearized 1/L 917439/O 106/E 54210/N 11/T 915243/H [ 1476 726]>> endobj xref 104 59 0000000016 00000 n 0000002202 00000 n 0000002321 00000 n 0000002831 00000 n...

View Article

Image may be NSFW.
Clik here to view.

Java vs. Scala: Divided We Fail

The discussion in that particular StackOverflow thread dates back a few questions, so instead of digging there, we will just take the latest benchmark code, and wrap it up with JMH. JMH already has the...

View Article

Image may be NSFW.
Clik here to view.

Call me maybe: MongoDB (2013)

Previously in Jepsen, we discussed Redis. In this post, we'll see MongoDB drop a phenomenal amount of data.MongoDB is a document-oriented database with a similar distribution design to Redis. In a...

View Article
Browsing all 737 articles
Browse latest View live