Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by programd
The Harlan Ellison Book Preservation Project
1 points
programd
2016-11-15T16:24:15Z
www.kickstarter.com
International Space Station Interior 4K Video Fly Through
3 points
programd
2016-11-02T21:13:21Z
www.youtube.com
Modeling the Architecture of Borges's Library of Babel
1 points
programd
2016-10-27T03:08:54Z
www.jwz.org
Google Curbs Expansion of Fiber Optic Network, Cutting Jobs
1 points
programd
2016-10-26T07:58:30Z
www.nytimes.com
NoSQL Databases: A Survey and Decision Guidance
2 points
programd
2016-10-24T17:07:54Z
medium.baqend.com
Computer program for simulating time travel, exploring the grandfather paradox
2 points
programd
2016-10-15T14:36:03Z
arxiv.org
MailChimp and the Un-Silicon Valley Way to Make It as a Startup
1 points
programd
2016-10-05T14:03:38Z
www.nytimes.com
Entropy/IP: Uncovering Structure in IPv6 Addresses
53 points
programd
2016-06-27T13:27:41Z
arxiv.org
Reviewing Messaging to Extraterrestrial Intelligence
1 points
programd
2016-05-30T15:47:10Z
arxiv.org
A Large-Scale Analysis of Malicious Web Shells [pdf]
1 points
programd
2016-05-19T19:42:29Z
www.securitee.org
Comparing Latency of the Top Public DNS Providers
1 points
programd
2016-03-30T17:28:03Z
blog.thousandeyes.com
New Empirical Constraint on Prevalence of Technological Species in the Universe
3 points
programd
2015-11-10T09:20:03Z
arxiv.org
Cookies set via HTTP may be used to bypass HTTPS and reveal private information
1 points
programd
2015-09-24T17:26:38Z
www.kb.cert.org
Give feedback on the new bookmarks experience in Chrome
2 points
programd
2015-04-18T22:19:37Z
productforums.google.com
BitWhisper: Signaling Between Air-Gapped Computers Using Thermal Manipulations [pdf]
16 points
programd
2015-04-14T14:03:18Z
arxiv.org
De-Anonymizing alt.anonymous.messages [pdf]
65 points
programd
2015-02-25T18:45:40Z
ritter.vg
These programming skills will earn you the most money
2 points
programd
2015-01-30T22:57:30Z
qz.com
The Computer Security Threat From Ultrasonic Networks
2 points
programd
2014-06-12T21:53:54Z
medium.com
On Covert Acoustical Mesh Networks in Air
1 points
programd
2014-06-12T08:31:50Z
arxiv.org
Who must you trust?
52 points
programd
2014-06-07T17:28:35Z
queue.acm.org
5
6
7
8
9
10