Hacker Newsnew | past | comments | ask | show | jobs | submit | andrewbinstock's submissionslogin
1.Kent Beck's Product Development Triathlon (facebook.com)
1 point by andrewbinstock on April 4, 2018 | past
2.FCC chair pushes for complete repeal of net neutrality (thehill.com)
1 point by andrewbinstock on Nov 21, 2017 | past
3.TI's Biggest Blunder: The TMS9900 Microprocessor (2017) (ieee.org)
5 points by andrewbinstock on Nov 4, 2017 | past
4.200 times more COBOL transactions today than Google searches (siliconrepublic.com)
8 points by andrewbinstock on Aug 7, 2017 | past
5.Supreme Court rules cell phone searches require a warrant (2014) (msnbc.com)
15 points by andrewbinstock on June 7, 2017 | past | 2 comments
6.Jean Sammet, co-creator of COBOL, has died (nytimes.com)
429 points by andrewbinstock on June 4, 2017 | past | 105 comments
7. [dupe] Yahoo says at least 500M accounts hacked in 2014 (reuters.com)
106 points by andrewbinstock on Sept 22, 2016 | past | 1 comment
8.Developers are calling it quits on polyglot programming (netstructuresolutions.com)
4 points by andrewbinstock on Feb 9, 2016 | past
9.Gene Amdahl has died (nytimes.com)
740 points by andrewbinstock on Nov 13, 2015 | past | 111 comments
10.When birds squawk, other species seem to listen (nytimes.com)
3 points by andrewbinstock on May 18, 2015 | past
11.The German Tank Problem (wikipedia.org)
2 points by andrewbinstock on May 12, 2015 | past
12.Farewell, Dr. Dobb's (drdobbs.com)
1029 points by andrewbinstock on Dec 16, 2014 | past | 320 comments
13.Function Purity and Immutability in D (drdobbs.com)
55 points by andrewbinstock on Oct 9, 2014 | past | 23 comments
14.Puppet server drops Ruby for Clojure (infoworld.com)
4 points by andrewbinstock on Sept 25, 2014 | past
15.Google to offer $100K in cloud credits to startups (googlecloudplatform.blogspot.com)
3 points by andrewbinstock on Sept 12, 2014 | past
16.Microsoft Build 2013 Conference to be June 26-28 in SF (buildwindows.com)
5 points by andrewbinstock on March 26, 2013 | past | 1 comment
17.Researchers identify phrases in encrypted VOIP calls without decryption [pdf] (unc.edu)
3 points by andrewbinstock on Sept 28, 2012 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: