Quantcast
Channel: Hacker News
Browsing all 737 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The “Chad” bug

The "chad bug".The Hangouts Dialer on Android absolutely REFUSES to find 2 of my contacts. I have 132 of them in the group "My Contacts" and all of them have phone numbers. Wanting to troubleshoot I...

View Article


Image may be NSFW.
Clik here to view.

Make a Doom level, part 2: design

Part 1: the basics· Part 2: design· Part 3: cheatingI assume you’ve read the introduction, which tells you the basics of putting a world together.This post is more narrative than mechanical; it’s a...

View Article


Image may be NSFW.
Clik here to view.

Do the math on your stock options

Are you considering an offer from a private company, which involves stock options? Do you think those stock options might be worth something one day? Are you confused? Then read this! I’ll give you...

View Article

Image may be NSFW.
Clik here to view.

Most commonly used statistical tests and implementation in R

This chapter explains the purpose of some of the most commonly used statistical tests and how to implement them in R1. One Sample t-TestWhy is it used?It is a parametric test used to test if the mean...

View Article

Image may be NSFW.
Clik here to view.

Introducing Guesstimate, a Spreadsheet for Things That Aren’t Certain

Introducing Guesstimate, a Spreadsheet for Things That Aren’t CertainExisting spreadsheet software is made for analyzing tables of data. Excel, Google Sheets, and similar tools are fantastic for doing...

View Article


Image may be NSFW.
Clik here to view.

Haskell Game Server – Part 2

Posted on January 1, 2016Previous PostsPart 1 - Networking & Message ProtocolsPart 1 Followup - A brief followup to my original post.TopicsIn today’s post I will cover which messages we shuffle...

View Article

Image may be NSFW.
Clik here to view.

} // good to go

Okay, let's see what we've got. Two sets of annotated training materials. Six books. Over four dozen online videos. Some 80 articles, interviews, and academic papers. A slew of blog entries, and more...

View Article

Image may be NSFW.
Clik here to view.

The Website Obesity Crisis

This is the text version of a talk I gave on October 29, 2015, at the Web Directions conference in Sydney. [53 minute video].The CrisisFake FixesFat AdsFat AssetsChickenshit MinimalismInterface...

View Article


Image may be NSFW.
Clik here to view.

Clojure 2015 Year in Review

Another year, another year-in-review post. To be honest, I feel like any attempt I make to summarize what happened in the Clojure world this year is largely moot. Clojure has gotten so big, so — dare I...

View Article


Image may be NSFW.
Clik here to view.

Tor Anonymity: Things Not to Do

Contents1Things NOT to do1.1I wonder what my site looks like when I'm anonymous.1.2Login into your real life Facebook account and think you are anonymous.1.3Never login into accounts you ever used...

View Article

Image may be NSFW.
Clik here to view.

Untangling an Accounting Tool and an Ancient Incan Mystery

PhotoPatricia Landa, an archaeological conservator, painstakingly cleans and untangles the khipus at her house in Lima.Credit William Neuman/The New York TimesLIMA, Peru — In a dry canyon strewn with...

View Article

Image may be NSFW.
Clik here to view.

Peter Naur: Programming as Theory Building (1985)

IntroductionThe present discussion is a contribution to the understanding of what programming is. It suggests that programming properly should be regarded as an activity by which the programmers form...

View Article

Image may be NSFW.
Clik here to view.

Up for Grabs: Projects which have curated tasks for new contributors

This is a list of projects which have curated tasks specifically for new contributors. These are a great way to get started with a project, or to help share the load of working on open source...

View Article


Image may be NSFW.
Clik here to view.

Agromafia

In Italy, Bill Whitaker finds out that the long arms of the Mafia extend to agricultural products, especially olive oil, on which the mob makes huge profits by exporting imitationsThe following is a...

View Article

Image may be NSFW.
Clik here to view.

IPv6 celebrates its 20th birthday by reaching 10% deployment

Twenty years ago this month, RFC 1883 was published: Internet Protocol, Version 6 (IPv6) Specification. So what's an Internet Protocol, and what's wrong with the previous five versions? And if version...

View Article


Image may be NSFW.
Clik here to view.

The Surreal Story of StubHub Screwing Over a Kobe Fan

January 6, 2016 As readers of TheLead know, we love nothing more than some good ol’ corporate muckraking, so when a reader named Jesse Sandler emailed us with a story that sounded too bizarre to be...

View Article

Image may be NSFW.
Clik here to view.

Three Years as a One-Man Startup

3 Years as a One Man StartupI’ve spent most of the past 3 years creating one language learning web-app, Readlang.I wrote about my struggle to get this off the ground almost two years ago and was...

View Article


Image may be NSFW.
Clik here to view.

Quiet naval hero who rescued Enigma machine dies aged 95

While the Germans jumped into the Atlantic, a 20-year-old David Balme and small team of sailors climbed into a rowing boat with simple instructions: Get what you can out of her.Balme, who’d been in the...

View Article

Image may be NSFW.
Clik here to view.

Postgres 9.5 Release Notes

A dump/restore using pg_dumpall, or use of pg_upgrade, is required for those wishing to migrate data from any previous release.Version 9.5 contains a number of changes that may affect compatibility...

View Article

Image may be NSFW.
Clik here to view.

PostgreSQL 9.5: UPSERT, Row Level Security, and Big Data

Posted on Jan. 7, 20167 JANUARY 2016: The PostgreSQL Global Development Group announces the release of PostgreSQL 9.5. This release adds UPSERT capability, Row Level Security, and multiple Big Data...

View Article
Browsing all 737 articles
Browse latest View live