Hacker News new | past | comments | ask | show | jobs | submit | 2015-06-27 login
Stories from June 27, 2015
Go back a day, month, or year. Go forward a day, month, or year.
1. Microsoft quietly pushes 18 new trusted root certificates (hexatomium.github.io)
286 points by svenfaw on June 27, 2015 | 136 comments
2. Show HN: Effort to clone unmaintained SourceForge projects to GitHub (a-sf-mirror.github.io)
146 points by hydragit on June 27, 2015 | 82 comments
3. Ask HN: How big does an open-source project need to be for a lifestyle business?
196 points by jnbiche on June 27, 2015 | 111 comments
4. Cancer reproducibility effort faces backlash (news.sciencemag.org)
156 points by tlb on June 27, 2015 | 115 comments
5. Understanding the Node.js Event Loop (nodesource.com)
135 points by antouank on June 27, 2015 | 23 comments
6. Why Google Employees Quit (2009) (techcrunch.com)
167 points by andrelaszlo on June 27, 2015 | 101 comments
7. The Three Great Virtues of a Programmer: Laziness, Impatience, and Hubris (c2.com)
147 points by aaronchall on June 26, 2015 | 67 comments
8. Increasing Variety on Pluto's Close Approach Hemisphere and a Dark Pole on Charon (nasa.gov)
113 points by benbreen on June 27, 2015 | 35 comments
9. Tell HN: Commercial VPN service now in open source
151 points by v_ivanov on June 27, 2015 | 35 comments
10. Open-sourcing Tutanota: Why it was important to us (tutanota.de)
87 points by winstonschmidt on June 27, 2015 | 63 comments
11. Django Developers Survery Results (docs.google.com)
113 points by neokya on June 27, 2015 | 31 comments
12. Cymmetria (YC S15) Uses Virtual Machines to Decoy and Detect Hackers (techcrunch.com)
61 points by easyd on June 27, 2015 | 29 comments
13. Mystery Man Moving Japan Made More Than 1M Trades (2014) (bloomberg.com)
88 points by 3eto on June 27, 2015 | 38 comments
14. What is a “good” memory corruption vulnerability? (googleprojectzero.blogspot.com)
81 points by scarybeast on June 26, 2015 | 4 comments
15. How to compile C apps with musl and Clang (procedural.github.io)
79 points by Procedural on June 27, 2015 | 49 comments
16. What to know about encodings and character sets (kunststube.net)
83 points by dshankar on June 26, 2015 | 30 comments
17. Philanthropy for Hackers (wsj.com)
89 points by petethomas on June 27, 2015 | 57 comments
18. 4chan discusses HN (4chan.org)
338 points by cantbecool on June 26, 2015 | 95 comments
19. FreeBSD Support for Leap Seconds (freebsd.org)
58 points by tachion on June 27, 2015 | 33 comments
20. Fast Approximate Logarithms, Part III: The Formulas (ebaytechblog.com)
52 points by kilimchoi on June 27, 2015 | 17 comments
21. Checklist for Web Components (github.com/webcomponents)
57 points by rinesh on June 27, 2015 | 7 comments
22. How I became and un-became a manga translator (bemmu.com)
49 points by bemmu on June 27, 2015 | 9 comments
23. Master Password (masterpasswordapp.com)
100 points by kenrose on June 27, 2015 | 62 comments
24. Electron as GUI of Python Applications (fyears.org)
63 points by jp_sc on June 27, 2015 | 33 comments
25. Reinventing organizations (2014) [pdf] (reinventingorganizations.com)
40 points by xvirk on June 27, 2015 | 13 comments
26. Pluto-bound probe faces its toughest task: finding Pluto (nature.com)
62 points by jdnier on June 27, 2015 | 9 comments
27. Why Is the Most-Viewed Gaming Video on YouTube About Cars 2? (minimaxir.com)
53 points by minimaxir on June 27, 2015 | 26 comments
28. University Students Made a Working Model Hyperloop (vice.com)
40 points by miralabs on June 27, 2015 | 26 comments
29. The Emperor's Old Clothes (1981) [pdf] (fsu.edu)
30 points by brudgers on June 27, 2015 | 5 comments
30. How I blog: One year of posts in a single org file (endlessparentheses.com)
48 points by melling on June 27, 2015 | 6 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: