|
| Articles written 10 to 19 that Hacker News still talks about. |
|
| Go back or forward one decade. Go to the previous or next century. |
|
1957 | | “Loving Your Enemies” (kingencyclopedia.stanford.edu) |
| 77 points | 7 years ago with 36 comments |
|
1958 | | Ernest Hemingway, the Art of Fiction No. 21 (theparisreview.org) |
| 77 points | 7 years ago with 4 comments |
|
1966 | | Frank Sinatra Has a Cold (esquire.com) |
| 77 points | 10 years ago with 16 comments |
|
1967 | | Programming as a medium for poorly understood, sloppily-formulated ideas (github.com) |
| 77 points | 6 years ago with 12 comments |
|
1970 | | A Relational Model of Data for Large Shared Data Banks (cs.uwaterloo.ca) |
| 77 points | 6 years ago with 37 comments |
|
1982 | | Radio hams do battle with 'Russian Woodpecker' (qsl.net) |
| 77 points | 10 years ago with 19 comments |
|
1986 | | Basic Cave Diving: A Blueprint for Survival (nsscds.org) |
| 77 points | 7 years ago with 43 comments |
|
1987 | | Scratch Monkey Story (edp.org) |
| 77 points across 2 posts | 9 years ago with 2 comments |
|
1987 | | Stan Ulam, John von Neumann, and the Monte Carlo Method (permalink.lanl.gov) |
| 77 points | 8 years ago with 19 comments |
|
1988 | | A Forth Apologia (holonforth.com) |
| 77 points | 2 years ago with 51 comments |
|
1992 | | The KeyKOS Nanokernel Architecture (cis.upenn.edu) |
| 77 points | 9 years ago with 10 comments |
|
1992 | | A Critique of Standard ML (cs.princeton.edu) |
| 77 points | 6 years ago with 12 comments |
|
1996 | | Classic SE Mistakes (cs.nmsu.edu) |
| 77 points | 2 years ago with 45 comments |
|
1996 | | Why I Wrote “The Crucible” (newyorker.com) |
| 77 points | 4 years ago with 86 comments |
|
1997 | | Casio Caleid XM-700 Mobile Navigator (blog.gingerbeardman.com) |
| 77 points | 1 year ago with 37 comments |
|
1999 | | Richard Feynman and Computation (pdfs.semanticscholar.org) |
| 77 points | 8 years ago with 2 comments |
|
1999 | | And so I'm giving up the Mozilla project - Jamie Zawinski (jwz.org) |
| 77 points | 14 years ago with 37 comments |
|
1937 | | World Brain: The Idea of a Permanent World Encyclopædia (sherlock.ischool.berkeley.edu) |
| 76 points | 8 years ago with 19 comments |
|
1956 | | The Negro Travelers' Green Book (digital.tcl.sc.edu) |
| 76 points | 7 years ago with 43 comments |
|
1971 | | The parable of the parking lots (nationalaffairs.com) |
| 76 points | 10 years ago with 19 comments |
|
1977 | | The Last Secrets of Skull and Bones (reprints.longform.org) |
| 76 points | 6 years ago with 64 comments |
|
1983 | | Put That There [video] (youtube.com) |
| 76 points | 3 years ago with 16 comments |
|
1984 | | How to Expose an Eavesdropper (fermatslibrary.com) |
| 76 points | 8 years ago with 5 comments |
|
1985 | | CROBOTS is a programming game, for programmers or aspiring programmers (tpoindex.github.io) |
| 76 points | 9 years ago with 9 comments |
|
1986 | | How Not to Lie with Statistics: Avoiding Common Mistakes (dash.harvard.edu) |
| 76 points | 10 years ago with 13 comments |
|
1987 | | Superoptimizer – A Look at the Smallest Program [pdf] (web.stanford.edu) |
| 76 points | 4 years ago with 30 comments |
|
1989 | | Cuts and jumpers on a different scale (stuff.mit.edu) |
| 76 points | 11 years ago with 7 comments |
|
1991 | | Neo Geo Programming Guide (hardmvs.com) |
| 76 points | 9 years ago with 16 comments |
|
1992 | | Alienable Rights (web.media.mit.edu) |
| 76 points | 9 years ago with 6 comments |
|
1992 | | Roundoff Error and the Patriot Missile (web.archive.org) |
| 76 points | 5 years ago with 10 comments |
|
1995 | | A Critique of ANSI SQL Isolation Levels (microsoft.com) |
| 76 points | 5 years ago with 12 comments |
|
1995 | | We Owe It All to the Hippies (members.aye.net) |
| 76 points | 10 years ago with 63 comments |
|
1996 | | Bob Dole and Jack Kemp (dolekemp96.org) |
| 76 points | 3 years ago with 46 comments |
|
1996 | | USB, Java take center stage at Comdex (sunsite.uakom.sk) |
| 76 points | 5 years ago with 42 comments |
|
1999 | | Infrequently Asked Questions in Comp.lang.c (seebs.net) |
| 76 points | 1 year ago with 38 comments |
|
1898 | | Cryptography: Or the History, Principles, and Practice of Cipher-Writing (publicdomainreview.org) |
| 75 points | 7 years ago with 2 comments |
|
1914 | | Graphic Methods for Presenting Facts (archive.org) |
| 75 points | 3 years ago with 25 comments |
|
1950 | | Computing machinery and intelligence (loebner.net) |
| 75 points | 8 years ago with 13 comments |
|
1957 | | Flowmatic (archive.computerhistory.org) |
| 75 points | 8 years ago with 31 comments |
|
1975 | | Church Committee Report on NSA Surveillance Affecting Americans (aarclibrary.org) |
| 75 points | 12 years ago with 12 comments |
|
1976 | | The first photograph taken from the surface of Mars (nasa.gov) |
| 75 points | 9 years ago with 10 comments |
|
1983 | | John Walker's Crisis Letter to Autodesk Employees (fourmilab.ch) |
| 75 points | 16 years ago with 17 comments |
|
1983 | | How and How Not to Write a Good Systems Paper (usenix.org) |
| 75 points | 6 years ago with 0 comments |
|
1984 | | Reflections on Trusting Trust (cs.cmu.edu) |
| 75 points | 5 years ago with 19 comments |
|
1992 | | A History of CLU – Barbara Liskov (citeseerx.ist.psu.edu) |
| 75 points | 8 years ago with 8 comments |
|
1994 | | Meme (Multitasking Extensible Messaging Environment): Multiuser Forth VR (web.archive.org) |
| 75 points | 5 years ago with 20 comments |
|
1994 | | Game Design Tips from Tom Hall (3drealms.com) |
| 75 points | 10 years ago with 15 comments |
|
1994 | | Self-Censorship in Public Discourse: A Theory of 'Political Correctness' (brown.edu) |
| 75 points | 7 years ago with 90 comments |
|
1997 | | How Many Objects Can Be Juggled (fermatslibrary.com) |
| 75 points | 7 years ago with 51 comments |
|
1923 | | Carl Akeley’s fight to the death with a leopard (stuffnobodycaresabout.com) |
| 74 points | 3 years ago with 58 comments |
|
|