Hacker Newsnew | past | comments | ask | show | jobs | submit | 2016-05-22login
Stories from May 22, 2016
Go back a day, month, or year. Go forward a day, month, or year.
1.My time with Rails is up
716 points by lreeves on May 22, 2016 | 438 comments
2.$12M stolen from 1,400 convenience store ATMs across Japan in 2 hours (mainichi.jp)
299 points by sjreese on May 22, 2016 | 194 comments
3.Autonomous Mini Rally Car Teaches Itself to Powerslide (ieee.org)
229 points by Osiris30 on May 22, 2016 | 45 comments
4.Nigerians Dominate Scrabble Tournaments Using Five-Letter Word Strategy (wsj.com)
295 points by vincentbarr on May 22, 2016 | 80 comments
5.Two Bytes to $951M (baesystemsai.blogspot.com)
264 points by ernsheong on May 22, 2016 | 77 comments
6.To write better code, read Virginia Woolf (nytimes.com)
133 points by my_first_acct on May 21, 2016 | 66 comments
7.Cling: An Interactive C++ interpreter (cern.ch)
202 points by indatawetrust on May 22, 2016 | 50 comments
8.TOTP SSH port fluxing (benjojo.co.uk)
133 points by benjojo12 on May 22, 2016 | 58 comments
9.Deoptimizing a C++ program (stackoverflow.com)
151 points by ingve on May 22, 2016 | 37 comments
10.ZFS, BTRFS, XFS, EXT4 and LVM with KVM – A Storage Performance Comparison (2015) (ilsistemista.net)
131 points by SXX on May 22, 2016 | 82 comments
11.Do Police Body Cameras Really Work? (ieee.org)
100 points by steve371 on May 22, 2016 | 75 comments
12.The Busy Beaver Game (johncarlosbaez.wordpress.com)
112 points by mathgenius on May 21, 2016 | 42 comments
13.Interactive Algorithm Visualizer (jasonpark.me)
144 points by nimitkalra on May 22, 2016 | 9 comments
14.BLESS: SSH Certificate Authority for Ephemeral SSH Sessions (github.com/netflix)
54 points by kkl on May 21, 2016 | 18 comments
15.Student Who Found Security Flaws in Police Protocol Gets Suspended Sentence (softpedia.com)
124 points by campuscodi on May 22, 2016 | 46 comments
16.In Japan’s Slow Economy, Rare Price Rise Prompts Surplus of Remorse (nytimes.com)
99 points by protomyth on May 22, 2016 | 105 comments
17.Deep biomarkers of human aging: Application of deep neural networks (impactaging.com)
71 points by jonbaer on May 22, 2016 | 6 comments
18.Browser as an Interactive Disassembler (2015) (mrale.ph)
66 points by Halienja on May 22, 2016 | 4 comments
19.Inside the Million-Machine Clickfraud Botnet (bitdefender.com)
67 points by nkurz on May 22, 2016 | 18 comments
20.Memories of unethical actions become obfuscated over time (pnas.org)
82 points by prashnts on May 22, 2016 | 9 comments
21.GSM/GPRS Traffic Interception for Penetration Testing Engagements (nccgroup.trust)
53 points by demouser7 on May 20, 2016 | 1 comment
22.Subterranea Britannica (subbrit.org.uk)
72 points by akakievich on May 22, 2016 | 11 comments
23.Monotonic Versioning Manifesto (appliedcompscilab.com)
103 points by Freaky on May 22, 2016 | 47 comments
24.Demon Core: The Strange Death of Physicist Louis Slotin (newyorker.com)
85 points by jseliger on May 22, 2016 | 34 comments
25.Achieving a Perfect SSL Labs Score with Go (bracelab.com)
98 points by 0xmohit on May 22, 2016 | 50 comments
26.Show HN: IPsec VPN Server in Docker Container (github.com/hwdsl2)
74 points by hwdsl2 on May 22, 2016 | 19 comments
27.$1M will buy 122 acres in part of U.S. National Radio Quiet Zone (washingtonpost.com)
102 points by jamessun on May 22, 2016 | 71 comments
28.Developing Erlang at Yahoo (2008) [pdf] (galois.com)
60 points by cpeterso on May 22, 2016 | 12 comments
29.Hiroshima (1946) (newyorker.com)
173 points by canjobear on May 22, 2016 | 187 comments
30.Antipersona: Use Twitter from the perspective of another account (antipersona.co)
122 points by convulsive on May 22, 2016 | 28 comments

Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: