Feedjunkie.com






 Share | RSS | Widgets | Home

« < 1 2 3 4 5 6 ... 13 14 15 > »

[+] Notes Nearing Ninety: Learning to Write Less 13-08-18 21:42

Hacker News

[+] The Fictional Foods We Wish Were Real 13-08-18 21:42

Hacker News

[+] A Couple Proved Vomit Fraud Happened, Lyft's Response I... 13-08-18 21:36

Hacker News

[+] Are there intrinsic properties at the most fundamental ... 13-08-18 21:26

Hacker News

[+] Most Millennials are not on track when it comes to savi... 13-08-18 21:22

Hacker News

[+] Universal Method To Sort Complex Information Found 13-08-18 21:21

Hacker News

[+] Show HN: unicode.style 13-08-18 21:04

Hacker News

[+] Trying Not to Try (2016) 13-08-18 20:35

Hacker News

[+] Microbiologist Carl Woese changed the way we think abou... 13-08-18 20:04

Hacker News

[+] Voter suppression keeps Georgia a red state 13-08-18 20:01

Hacker News

[+] Show HN: A side project in medical devices 13-08-18 19:45

Hacker News

[+] Ask HN: What is your favorite gym motivation video? 13-08-18 19:15

Hacker News

[+] Original Source code for the Furby [pdf] 13-08-18 19:04

Hacker News

[+] Show HN: Trackerjacker – Map and track wifi networks yo... 13-08-18 19:00

Hacker News

[+] How to Hire Your First Engineer 13-08-18 18:42

Hacker News

[+] Would You Let the I.R.S. Prepare Your Taxes? (2015) 13-08-18 18:37

Hacker News

[+] Show HN: HSTR – easily view, navigate, search and manag... 13-08-18 18:32

Hacker News

[+] Controlling electric signals in the body could help it ... 13-08-18 18:24

Hacker News

[+] Open Journal Systems: free-software journal management ... 13-08-18 18:03

Hacker News

[+] Shrinking Machine Learning Models for Offline Use 13-08-18 18:03

Hacker News

[+] Endocrine-disrupting chemical exposure in US: disease b... 13-08-18 18:00

Hacker News

[+] Mark Zuckerberg Is Totally Out of His Depth 13-08-18 17:57

Hacker News

[+] The Toadmen, Masters of Equine Magic 13-08-18 17:54

Hacker News

[+] The tech industry's use of persuasive techniques on chi... 13-08-18 17:48

Hacker News

[+] Ask HN: Best way to publish papers as a non-scholar? 13-08-18 17:34

Hacker News

[+] Dear customers of Cloudflare: an appeal regarding Tor 13-08-18 17:25

Hacker News

[+] Organized Resources for Deep Learning Researchers and D... 13-08-18 17:23

Hacker News

[+] Seva Coffee (YC S15) – Roast Grind Brew Coffee Robot – ... 13-08-18 17:20

Hacker News

[+] The Art of Travel (1872) 13-08-18 17:18

Hacker News

[+] The Bell System Technical Journal 13-08-18 17:04

Hacker News

[+] Jigsolved: Computer Vision to Solve Jigsaw Puzzles 13-08-18 16:28

Hacker News

[+] A list of startups funded in 2017 13-08-18 15:41

Hacker News

[+] NTCP2 – An authenticated key agreement protocol for I2P 13-08-18 15:27

Hacker News

[+] The 10:1 rule of writing and programming 13-08-18 15:12

Hacker News

[+] Update on Taking Tesla Private 13-08-18 15:04

Hacker News

[+] France approves 720MW of solar as price falls another 5% 13-08-18 14:53

Hacker News

[+] History of the ISA: Digital Equipment Corporation 13-08-18 14:34

Hacker News

[+] Creating the alien writing in Infinifactory (2015) 13-08-18 14:10

Hacker News

[+] Google tracks your movements, like it or not 13-08-18 13:34

Hacker News

[+] AP Google tracks your movements, like it or not 13-08-18 13:34

Hacker News

[+] Why GE Digital Failed 13-08-18 13:33

Hacker News

[+] Ask HN: Recommendations of good cybercrime novels? 13-08-18 13:19

Hacker News

[+] Turkish Grammar by Predicate Logic 13-08-18 12:55

Hacker News

[+] Audacious 3.10 released 13-08-18 12:38

Hacker News

[+] OpenMetrics project accepted into CNCF Sandbox 13-08-18 12:13

Hacker News

[+] Survival in the first hours of the Cenozoic (2004) [pdf] 13-08-18 11:38

Hacker News

[+] Punctuation that failed to make its mark 13-08-18 11:13

Hacker News

[+] The Riemann hypothesis is proved 13-08-18 10:49

Hacker News

[+] Proof of the Riemann Hypothesis on a Relativistic Turin... 13-08-18 10:49

Hacker News

[+] The Total Beginner's Guide to Game AI 13-08-18 10:34

Hacker News

[+] Curry–Howard correspondence 13-08-18 10:22

Hacker News

[+] Bluetooth Low Energy Swiss-Army Knife 13-08-18 09:10

Hacker News

[+] A "once-in-a-lifetime" shot of Mount Colima during a po... 13-08-18 08:57

Hacker News

[+] The Age of Cretinism 13-08-18 08:53

Hacker News

[+] Yes, You Can Put a Price on a T-Rex (2015) 13-08-18 08:35

Hacker News

[+] How to deal with dirty side effects in your pure functi... 13-08-18 08:16

Hacker News

[+] Exif.tools – A multimedia file metadata tool 13-08-18 07:58

Hacker News

[+] How can you treat someone who doesn’t accept they are ill? 13-08-18 07:50

Hacker News

[+] Mkcert: Tool for making locally-trusted development cer... 13-08-18 07:38

Hacker News

[+] Absolute Hot 13-08-18 05:49

Hacker News

[+] Starting your own bank is laborious but profitable (2009) 13-08-18 05:34

Hacker News

[+] A Basic Just-In-Time Compiler (2015) 13-08-18 04:58

Hacker News

[+] Project Natick – Underwater datacenter with live cameras 13-08-18 04:47

Hacker News

[+] AssemblyAI: speech-to-text API 13-08-18 04:20

Hacker News

[+] Ask HN: Are there any HN-style web sites with mechanica... 13-08-18 04:19

Hacker News

[+] Bitcoin and Ethereum Fall Substantially in $18B Crypto ... 13-08-18 04:14

Hacker News

[+] What is Intel’s Thunderbolt 3 dual port controller’s to... 13-08-18 03:30

Hacker News

[+] Last Week in Pony – August 12, 2018 13-08-18 03:04

Hacker News

[+] 457 Australians broke world record of electric guitar e... 13-08-18 02:52

Hacker News

[+] In a Town of 11 People, Mysterious Disappearance Turns ... 13-08-18 02:28

Hacker News

[+] Vegas – Where Thugs Come into Your Room and Search Your... 13-08-18 01:54

Hacker News

[+] Heavy-handed security searches of hotel rooms at Defcon... 13-08-18 01:54

Hacker News

[+] Empty shipyard and suicides as 'Hyundai Town' grapples ... 13-08-18 01:35

Hacker News

[+] Odeillo solar furnace 13-08-18 01:23

Hacker News

[+] Exapunks 13-08-18 00:45

Hacker News

[+] Show HN: A syntax-diagram generator for rust's macro_ru... 13-08-18 00:25

Hacker News

[+] Kinds of types in Scala: take type, return type or type... 13-08-18 00:16

Hacker News

[+] The dynamics of Mutual Motion Camouflage 13-08-18 00:06

Hacker News

[+] The Fall of Schlitz: How Milwaukee’s Famous Beer Became... 12-08-18 23:49

Hacker News

[+] Deep learning to predict the lab-of-origin of engineere... 12-08-18 23:37

Hacker News

[+] Tide-Predicting Machine No. 2 12-08-18 23:35

Hacker News

[+] Show HN: Just Get Me Food 12-08-18 23:26

Hacker News

[+] Salt not as damaging to health as previously thought, s... 12-08-18 23:08

Hacker News

[+] She Had a Genius Idea: Air-Conditioned Doghouses, then ... 12-08-18 22:56

Hacker News

[+] Flexport is hiring software engineers 12-08-18 22:52

Hacker News

[+] The Strange Persistence of First Languages (2015) 12-08-18 22:45

Hacker News

[+] Jorge Luis Borges Interview (1977) 12-08-18 22:18

Hacker News

[+] X.509 Style Guide (2000) 12-08-18 22:13

Hacker News

[+] How to Lose $3B of Bitcoin in India 12-08-18 22:13

Hacker News

[+] Show HN: Flip gender in Python 12-08-18 21:45

Hacker News

[+] Do “sin taxes” work? 12-08-18 21:45

Hacker News

[+] Google's censored Chinese search engine: a catalogue of... 12-08-18 21:42

Hacker News

[+] Growers Are Beaming Over the Success of Lasers to Stave... 12-08-18 21:31

Hacker News

[+] How broken is the USPTO: How is this a patent 12-08-18 21:30

Hacker News

[+] Building a Self-Healing Operating System (2007) [pdf] 12-08-18 21:27

Hacker News

[+] My Haskell Journey from C# 12-08-18 21:16

Hacker News

[+] Fully digital valves open up engine possibilities 12-08-18 20:59

Hacker News

[+] What the Hell Are We Going to Do About the Boomers? 12-08-18 20:58

Hacker News

[+] Dijkstra's in Disguise 12-08-18 20:45

Hacker News

[+] Frink 12-08-18 20:37

Hacker News

« < 1 2 3 4 5 6 ... 13 14 15 > »