Lindy Hacker News | | submit
Articles written 20 to 29 that Hacker News still talks about.
Go back or forward one decade. Go to the previous or next century.
2011Solar Sinter: Solar-powered 3D printer that sinters sand into 3D objects (markuskayser.com)
88 points | 9 years ago with 25 comments
2011Fabrice Bellard: Portrait of a Super-Productive Programmer (blog.smartbear.com)
88 points | 11 years ago with 24 comments
2011Multiplexing on top of TCP (250bpm.com)
88 points | 9 years ago with 47 comments
2011I'm the guy who bought 259684 BTC for under $3000 yesterday (web.archive.org)
88 points | 4 years ago with 80 comments
2011Pycel: Compiling Excel spreadsheets to Python and making pretty pictures (dirkgorissen.com)
88 points | 5 years ago with 4 comments
2011South Korean police impose curfew on late-night studying (content.time.com)
88 points | 5 years ago with 68 comments
2011Bodies hanging from bridge in Mexico are warning to social media users (cnn.com)
88 points | 11 years ago with 32 comments
2012How to Generate Millions of HTTP Requests (dak1n1.com)
88 points | 10 years ago with 25 comments
2012What makes Paris look like Paris? (cacm.acm.org)
88 points | 7 years ago with 84 comments
2012Random Write Considered Harmful in SSDs (usenix.org)
88 points | 8 years ago with 22 comments
2012SHUT THE FUCK UP. WE DO NOT BREAK USERSPACE! (lkml.org)
88 points across 2 posts | 3 years ago with 9 comments
2012Mexican Cartels Enslave Engineers to Build Radio Network (wired.com)
88 points | 11 years ago with 66 comments
2012Mathematical Foundations of Computer Networking (pearson.com)
88 points | 2 years ago with 9 comments
2012Scripting Nginx with Lua (londonlua.org)
88 points | 11 years ago with 22 comments
2012Macro Shots Taken Inside Instruments (fstoppers.com)
88 points | 3 years ago with 11 comments
2000The AdaOS Operating System (web.archive.org)
87 points | 6 years ago with 55 comments
2001Latency Compensating Methods in Client/Server In-Game Protocol Design (developer.valvesoftware.com)
87 points | 6 years ago with 14 comments
2002The Law of Leaky Abstractions (joelonsoftware.com)
87 points | 11 years ago with 31 comments
2003Friendly Feudalism: The Tibet Myth (swans.com)
87 points | 5 years ago with 166 comments
2003It Can Be Done (multicians.org)
87 points | 7 years ago with 18 comments
2003The Origin of Mass (web.mit.edu)
87 points | 8 years ago with 28 comments
2004The Stick of Jan Sloot (spronck.net)
87 points | 2 years ago with 46 comments
2004How to Write a Pac-Man Game in JavaScript (masswerk.at)
87 points | 10 years ago with 16 comments
2004How much oxygen for a person to survive in an air-tight enclosure? (members.shaw.ca)
87 points | 9 years ago with 62 comments
2005Why no Easter Eggs? (web.archive.org)
87 points | 4 years ago with 59 comments
2006Deepest hand dug well in the world (mybrightonandhove.org.uk)
87 points | 8 years ago with 16 comments
2007Linkers, part 1 (airs.com)
87 points across 2 posts | 10 years ago with 7 comments
2007A Prayer for Archimedes (sciencenews.org)
87 points | 9 years ago with 33 comments
2008A logarithmic image transformation (josleys.com)
87 points | 7 years ago with 4 comments
2008Late Bloomers: Why Do We Equate Genius with Precocity? (newyorker.com)
87 points | 7 years ago with 41 comments
2008Brian's Rules for Writing Cross Platform 'C' Code (ski-epic.com)
87 points | 11 years ago with 52 comments
2009Kind of Bloop (kindofbloop.com)
87 points | 3 years ago with 30 comments
2009Someone Stole My Startup Idea: They Raised Money with My Slides? (steveblank.com)
87 points | 6 years ago with 19 comments
2009The miracle of Smalltalk’s become: (gbracha.blogspot.com)
87 points | 2 years ago with 29 comments
2009Microchips That Shook the World (spectrum.ieee.org)
87 points across 2 posts | 5 years ago with 24 comments
2010How long does it take to make a context switch? (blog.tsunanet.net)
87 points | 8 years ago with 72 comments
2011In Nuclear Silos, Death Wears a Snuggie (wired.com)
87 points | 9 years ago with 58 comments
2011Tresor – CPU-only AES implementation resistant to RAM cold-boot attacks (www1.informatik.uni-erlangen.de)
87 points | 9 years ago with 14 comments
2011What Do Public Library Workers Do? (laurensmith.wordpress.com)
87 points | 9 years ago with 40 comments
2011Principles of Programming Languages (feederio.com)
87 points | 8 years ago with 5 comments
2011Escape the scripter mentality if reliability matters (rachelbythebay.com)
87 points | 6 years ago with 52 comments
2012A Personal Lisp Crisis (blog.jacius.info)
87 points | 9 years ago with 38 comments
2012Don’t Quit Your Day Job: Using Wage Earnings to Support a New Business (frbatlanta.org)
87 points | 11 years ago with 39 comments
2012Management Debt (a16z.com)
87 points | 4 years ago with 23 comments
2012Obfuscated Erlang (ferd.ca)
87 points | 6 years ago with 14 comments
2000Statistical mechanics of money (arxiv.org)
86 points | 6 years ago with 60 comments
2000Nuclear Pulse Propulsion – Orion and Beyond (ntrs.nasa.gov)
86 points | 9 years ago with 99 comments
2001Recollections of Early Chip Development at Intel (lark.tu-sofia.bg)
86 points across 2 posts | 6 years ago with 2 comments
2001Re: What is acceptable for -ffast-math? (gcc.gnu.org)
86 points | 8 years ago with 37 comments
2003Twenty years of speedcubing (ws.binghamton.edu)
86 points | 7 years ago with 22 comments

If you like quirky internet articles, you'll like the Unclutter reader mode too!