Lindy Hacker News | | submit
2014Unsigned int considered harmful for Java (nayuki.io)
27 points | 2 years ago with 57 comments
2007Please tell us what features you’d like in news.ycombinator (news.ycombinator.com)
72 points across 2 posts | 2 years ago with 55 comments
1998Cool URIs Don't Change (w3.org)
1470 points across 5 posts | 2 years ago with 120 comments
2008The Tunguska Mystery 100 Years Later (scientificamerican.com)
94 points | 2 years ago with 74 comments
2017CGI Renders Are Real Photos (petapixel.com)
237 points | 2 years ago with 63 comments
1993Down with GUIs! (wired.com)
12 points | 2 years ago with 2 comments
2002Objects Have Not Failed (dreamsongs.com)
37 points | 2 years ago with 13 comments
2002Objects Have Failed (dreamsongs.com)
44 points | 2 years ago with 100 comments
2009Hacking with Style: TrueType VT220 Font (sensi.org)
157 points across 2 posts | 2 years ago with 32 comments
2013Aboriginal Australian genomes reveal Indian ancestry (nature.com)
226 points | 2 years ago with 216 comments
2015You cannot have exactly-once delivery (bravenewgeek.com)
189 points | 2 years ago with 217 comments
2016Unit of Value: A Framework for Scaling (news.greylock.com)
27 points | 2 years ago with 5 comments
2010Advice to Aimless, Excited Programmers (prog21.dadgum.com)
276 points | 2 years ago with 84 comments
2019JAX – Augments numpy and Python code with function transformations (colinraffel.com)
65 points | 2 years ago with 12 comments
2008A spellchecker used to be a major feat of software engineering (prog21.dadgum.com)
676 points across 2 posts | 2 years ago with 179 comments
2019Götz von Berlichingen – The “Iron Hand” of the Renaissance (ncbi.nlm.nih.gov)
26 points | 2 years ago with 9 comments
2004Do the simplest thing that can possibly work (twasink.net)
225 points | 2 years ago with 89 comments
2013X12: Requirements for a successor to the X11 protocol (x.org)
193 points | 2 years ago with 300 comments
2012Mathematical Foundations of Computer Networking (pearson.com)
88 points | 2 years ago with 9 comments
2004Dumpster Diving FAQ (ranprieur.com)
85 points | 2 years ago with 86 comments
2009Work less, get more done: Analytics for maximizing productivity (kalzumeus.com)
200 points | 2 years ago with 116 comments
2008Very Long-Term Backup (longnow.org)
205 points | 2 years ago with 139 comments
2017How confusion spreads and becomes engrained (stephan-shahinian.medium.com)
59 points | 2 years ago with 39 comments
1998Inmos and the Transputer (transputer.net)
84 points | 2 years ago with 58 comments
20172D Liquid Simulator with Cellular Automaton (jgallant.com)
289 points | 2 years ago with 68 comments
2019CPU of the Day: UTMC UT69R000: The RISC with a Trick (cpushack.com)
62 points | 2 years ago with 9 comments
2008Lessons from the Debian/OpenSSL Fiasco (research.swtch.com)
59 points | 2 years ago with 25 comments
2019Consider the Golden Mole (lrb.co.uk)
38 points across 2 posts | 2 years ago with 2 comments
2016Sharing the Load: Amish Healthcare Financing (ncbi.nlm.nih.gov)
60 points | 2 years ago with 48 comments
2017Medical response to a vinyl chloride release from a train derailment (ncbi.nlm.nih.gov)
89 points | 2 years ago with 39 comments
1993I'd like to propose a new, optional HTML tag (twitter.com)
10 points | 2 years ago with 2 comments
2018Checking Firewall Equivalence with Z3 (ahelwer.ca)
84 points | 2 years ago with 13 comments
2014My Friend, Stalin’s Daughter (newyorker.com)
120 points | 2 years ago with 55 comments
2011First, Let’s Fire All the Managers (hbr.org)
68 points across 3 posts | 2 years ago with 2 comments
2009Things I Won't Work With: Thioacetone (science.org)
164 points | 2 years ago with 75 comments
1705Dool-Hoff: A Dutch Maze with New Jerusalem at Its Centre (publicdomainreview.org)
19 points | 2 years ago with 6 comments
2019How to weaponize the Yubikey (blackhillsinfosec.com)
168 points | 2 years ago with 20 comments
2017Encryption Lava Lamps (atlasobscura.com)
513 points across 3 posts | 2 years ago with 37 comments
1981Computing e to 116,000 Places with a Personal Computer (archive.org)
84 points | 2 years ago with 28 comments
2012Baynutting: Tips for Harvesting, Storing and Using California Bay Nuts (paleotechnics.wordpress.com)
26 points | 2 years ago with 10 comments
2013How the cover art of Defender of the Crown (1986) was made (spelpappan.se)
90 points | 2 years ago with 25 comments
2019Human mind control of rat cyborg's movement via brain-to-brain interface (nature.com)
72 points | 2 years ago with 41 comments
2016So, you’ve been challenged to a duel. What are the rules? (blogs.loc.gov)
134 points | 2 years ago with 134 comments
1946User Manual for the Harvard Mark 1 Electro-Mechanical Computer (archive.org)
32 points | 2 years ago with 8 comments
2016Reverse engineering a mysterious UDP stream in my hotel (gkbrk.com)
1544 points across 2 posts | 2 years ago with 179 comments
2016Biohazard: Iconic symbol designed to be “memorable but meaningless” (99percentinvisible.org)
153 points | 2 years ago with 61 comments
2009Defensive tool use in a coconut-carrying octopus (sciencedirect.com)
48 points | 2 years ago with 21 comments
2006Keith Lynch's timeline of net related terms and concepts (keithlynch.net)
31 points | 2 years ago with 11 comments
2012Parody HN Homepage (linkedlistnyc.org)
678 points across 2 posts | 2 years ago with 13 comments
2007Omniscient Debugging (omniscientdebugger.github.io)
40 points | 2 years ago with 19 comments
More

If you like quirky internet articles, you'll like the Unclutter reader mode too!