Here, on the cusp of the future, there’s always a plethora of fresh ideas and exciting opportunities for both ourselves and humanity at large.

But think back to last year. I’m sure there’s something you believed in, something for which you had hope, like a new gadget, a new job or a maybe new hypothesis about the nature of dark matter, that has proven, with the slow passage of months, to be somewhat mundane.

Now, consider a decade ago: American Idol. John Kerry. Iraq. PHP. What about two decades? Seinfeld. Sarajevo. The Internet!

It all seems rather staid, doesn’t it?

One of my hobbies is trying to shatter this prism of perspective by reading about what we actually thought about things as they were happening. I love newspaper stories about the USSR written in the 1980s, articles about the year 2000 written in the 1950s and polemics about home ownership written in 2005.

Surprisingly, one excellent source for this material is the website Hacker News. Though the site’s primary function is news and product curation by a consortium of technically-minded people, a common trope among its users is the dredging of the Internet’s dustbin for historical material that helps put today’s world in perspective.

For example:

  • This 1994 memo by an NPR staffer: “Internet is coming to NPR!”
  • A 5,000 word report about the dangers of the U.S. space flight programm, written by Richard Feynman in the wake of the Challenger disaster. “For a successful technology, reality must take precedence over public relations, for nature cannot be fooled.”
  • A 1981 New York Times story, headlined: “Rare Cancer Seen in 41 Homosexuals”. “The cause of the outbreak is unknown, and there is as yet no evidence of contagion.”
  • This 1999 CNN Money article about a “$3.6 billion deal that will further solidify Yahoo!’s position as a frontrunner in the online popularity contest”: the purchase of GeoCities.

I decided to extract a bunch of these articles and create a timeline – below – of history, as seen through the lens of Hacker News.

Year Points Comments Post
1776 58 18 Thomas Paine: Common Sense (1776)
1854 92 16 Life Without Principle (1854)
1864 60 11 Karl Marx’s letter to Abraham Lincoln (1864)
1865 123 32 To My Old Master (1865)
1868 108 25 Five Hundred and Seven Mechanical Movements (1868)
1890 44 1 Warren and Brandeis, “The Right to Privacy” (1890)
1905 68 10 Intuition and Logic in Mathematics (1905)
1909 198 96 G.K. Chesterton: The fallacy of success (1909)
1909 109 24 The Machine Stops (1909)
1910 129 34 How to Live on Twenty-Four Hours a Day (1910)
1920 34 44 US invasion plan for Canada (1920) [pdf]
1922 620 158 Why I Quit Being So Accommodating (1922)
1922 107 26 Follow This Rule If You Want To Be Popular (1922)
1924 377 262 Why I Never Hire Brilliant Men (1924)
1928 191 143 On being the right size (1928)
1929 79 11 Exposing Houdinis Tricks of Magic (1929)
1932 274 118 Bertrand Russell: In Praise of Idleness (1932)
1934 151 136 H. G. Wells interview with Stalin (1934)
1934 128 98 Was My Life Worth Living? (1934)
1935 89 4 “Let America Be America Again” by Langston Hughes (1935)
1938 112 49 Tolkien Snubs a German Publisher Asking for Proof of His Aryan Descent (1938)
1941 58 10 Einstein Reads The Common Language of Science (1941)
1944 176 67 Simple Sabotage Field Manual (1944)
1945 102 32 As We May Think (1945)
1945 19 2 First Draft of a Report on the EDVAC by John von Neumann (1945)
1946 193 62 George Orwell: Politics and the English Language (1946)
1953 94 46 A Study of Assassination CIA (1953)
1953 56 26 Albert Camus: The Life of the Artist A Mimodrama in Two Parts (1953)
1956 12 1 Route Selection and Cable Laying for the Transatlantic Cable System (1956)
1958 82 31 I, Pencil (1958)
1958 26 8 The Lesson of Iraq (1958)
1959 125 34 Feynman: There’s Plenty of Room at the Bottom (1959)
1960 37 5 The computer that put Neil Armstrong on the moon (1960)
1960 29 12 Lisp 1 Programmer’s Manual (1960) [pdf]
1967 19 3 Walter Cronkite Tours the Home of 2001 (1967)
1969 61 18 LIFE on the Moon (1969)
1970 201 117 The Tyranny of Structurelessness (1970)
1970 169 121 Soviet College Admission My Dad’s Story (1970)
1971 63 36 Project Cybersyn (1971)
1972 138 56 The Humble Programmer (1972)
1972 40 5 Spacewar Fanatic Life and Symbolic Death Among the Computer Bums (1972)
1974 199 61 Richard Feynman: Cargo Cult Science (1974)
1974 54 33 The Conversation (1974)
1974 46 20 The Conversation (1974)
1974 33 3 Computer Programming as an Art (1974) [pdf]
1975 72 12 Church Committee Report on NSA Surveillance Affecting Americans (1975) [pdf]
1976 53 41 An open letter to hobbyists by Bill Gates (1976)
1977 57 70 Can Programming Be Liberated From The Von Neumann Style? (1977) [pdf]
1977 8 0 Golden Record: Data Visualization for Extraterrestrials (1977)
1979 187 45 Land without Plea Bargaining: How the Germans Do It (1979)
1979 112 35 Design of Lisp-based Processors (1979)
1979 20 4 DND-1 Source Code by Richard Garriott (1979) [pdf]
1980 76 73 Beam Me Out Of This Death Trap, Scotty (1980)
1980 65 13 Yet Another Modest Proposal: The Roentgen Standard (1980)
1981 172 143 Rare Cancer Seen In 41 Homosexuals (1981)
1981 51 10 The Interlisp Programming Environment (1981) [pdf]
1981 47 11 The Optical Mouse (1981) [pdf]
1981 47 5 Lisp: Basically Speaking (1981) [pdf]
1981 43 2 Gabriel Garcia Marquez, The Art of Fiction No. 69 (1981)
1982 270 221 Have You Ever Tried to Sell a Diamond? (1982)
1982 115 102 Inside the Soviet Army (1982)
1982 113 23 Bill Buxton: Multi-Touch Systems that I Have Known (1982)
1982 48 46 The fate of published peer-reviewed articles, submitted again (1982)
1983 352 150 New UNIX implementation (1983)
1983 147 27 A Proposal For A System To Replace Ordinary Record Merchandising (1983)
1983 116 34 Free Unix (1983)
1984 50 7 Personal Computers Hardware Review Apple Weighs in With Macintosh (1984)
1984 27 10 Interview with Bill Joy (1984)
1984 13 7 Value of Windowing is Questioned (1984)
1985 77 10 Super Mario Bros Coin Sound (1985)
1985 46 24 E.W.Dijkstra Archive: Interview (1985)
1985 16 14 Sinclair C5 Electric Car (1985)
1986 285 168 Programmers At Work: Bill Gates (1986)
1986 125 79 Personal observations on the reliability of the Shuttle (1986)
1986 67 19 My Life as a Forth Interpreter (1986) [pdf]
1986 64 27 Richard Hamming: You and Your Research (1986)
1986 44 39 BYTE Interview With Richard Stallman (1986)
1987 102 59 Unix Text Processing (1987)
1987 80 14 Lisp: A Language for Stratified Design (1987) [pdf]
1987 59 64 History Uncut: Bill Gates unveils Microsoft Excel (1987)
1987 33 21 Armored Car Used to Potentially Block Minuteman-Missile Launch (1987)
1987 18 2 The Hitchhiker’s Guide to the Internet (1987)
1988 104 61 Dijkstra: On the cruelty of really teaching computer science (1988) [pdf]
1988 79 24 The Original Hacker’s Dictionary (1988)
1988 67 84 Yugoslavs Find No Paradise at McDonald’s (1988)
1988 46 19 Tom Duff on Duff’s Device (1988)
1988 39 18 Tablet: Personal Computer in the Year 2000 (1988)
1988 34 26 Morris Worm Incident Report #1 (1988) [pdf]
1989 117 11 Richard Feynman and The Connection Machine (1989)
1989 96 36 Stack Computers: the new wave (1989)
1989 28 12 Infocom’s ZIL programming language user’s guide (1989) [pdf]
1989 8 0 The Everlasting Autodidact (1989)
1990 42 9 The Science of Scientific Writing (1990)
1990 17 31 Game Show Problem (1990)
1991 369 186 What would you like to see most in minix? (1991)
1991 179 35 Tim Berners-Lee’s Original Announcement (1991)
1991 51 11 The Wonderful Power of Storytelling (1991)
1991 23 2 A 3-Instruction Forth for Embedded Systems Work (1991)
1992 134 26 On the Typography of Flight-Deck Documentation (1992) [pdf]
1992 67 11 A Scheme Story (1992)
1992 64 16 Linus Torvalds: Long Filenames (1992)
1992 4 1 The Hacker Crackdown: Law and Disorder on the Electronic Frontier (1992)
1993 210 131 How To Deconstruct Almost Anything (1993)
1993 161 62 Proposed new HTML tag: IMG (1993)
1993 119 38 TCP in 30 instructions (1993)
1993 101 23 The Turn (1993)
1993 53 59 Bruce Sterling: Internet (1993)
1993 53 6 Secrets of the Magus (1993)
1993 49 18 The World Wide Web project (1993)
1993 21 6 New NIST/NSA Revelations (1993)
1994 82 47 A Wired.com reporter was first to register mcdonalds.com (1994)
1994 62 28 Internet at NPR (1994)
1994 62 14 Rich Hickey on Functors in C++ (1994)
1994 52 5 The history of Unix is as much about collaboration as technology (1994)
1994 48 24 Haskell, Ada, C++, Awk: An Experiment in Prototyping Productivity (1994) [pdf]
1994 48 1 NSA security guidelines (1994)
1994 38 25 Do Too Many Lawyers Spoil The Economy? [1994]
1995 214 168 How Software Companies Die by Orson Scott Card (1995)
1995 167 23 Hamming, “You and Your Research” (1995) [video]
1995 137 67 The Great Ivy League Nude Posture Photo Scandal (1995)
1995 93 10 The Rise and Fall of Thinking Machines (1995)
1995 88 63 Netiquette (1995)
1995 82 16 NSA “can and does listen to everyone from senators to lovers” (1995)
1995 80 56 Against Intellectual Property (1995)
1995 80 22 Matt Blaze: My life as an international arms courier (1995)
1995 71 67 Why the Web Won’t Be Nirvana (1995)
1995 58 45 The Rise and Fall of Thinking Machines (1995)
1995 49 14 How Software Companies Die (1995)
1995 47 51 Plan 9 from Bell Labs (1995)
1995 45 19 Can You Work in Netscape Time? (1995)
1995 31 23 PGPfone (1995)
1995 19 14 MuP21 A High Performance MISC Processor (1995)
1995 7 4 Why the Internet will never work (1995)
1995 7 3 Netscape and Sun Announce JavaScript (1995)
1996 289 80 The Net Is a Waste of Time (1996)
1996 95 21 “Invisible Electrostatic Wall” at 3M adhesive tape plant (1996)
1996 92 20 Why Should Engineers and Scientists Be Worried About Color? (1996)
1996 77 60 How Perl Saved the Human Genome Project (1996)
1996 70 8 Dylan Programming Guide (1996) now in PDF, ePub, updated HTML
1996 64 14 Dylan Programming Guide (1996) now in PDF, ePub, updated HTML
1996 60 14 The Long Strange Trip to Java (1996)
1996 59 15 Mother Earth Mother Board (1996)
1996 52 22 On the (nearly lethal) comforts of a luxury cruise (1996) [pdf]
1996 48 36 Hearts, Clubs, Diamonds, Spades: Players Who Suit MUDs (1996)
1996 43 20 How To Make A Mint: The Cryptography Of Anonymous Electronic Cash (1996)
1996 40 56 San Jose Is Hell On Earth (1996)
1996 37 6 To Dissect a Mockingbird: A Graphical Notation for the Lambda Calculus (1996)
1996 32 19 The Artificial Womb Is Born And The World of the Matrix Begins (1996)
1996 28 10 They Write the Right Stuff (1996)
1996 27 8 Who’s writing the book on web business? (1996)
1996 26 18 CEO Responds to Nun’s Urging a ‘Politically Correct’ Board Make-up (1996)
1996 17 9 The Noel Smith-Wenkle Salary Negotiation Method (1996)
1997 404 177 The Cold Hard Facts of Freezing to Death (1997)
1997 109 51 Why Awk for AI? (1997)
1997 89 44 Doc Searls on Steve Jobs (1997)
1997 65 10 Functional C (1997)
1997 52 11 Herbert Dow, the Monopoly Breaker (1997)
1997 49 15 Integer Hash Function (1997)
1997 46 13 Forgotten Benefactor of Humanity (1997)
1997 38 59 Assassination Politics (1997)
1997 37 4 The Long Boom: A History of the Future (1997)
1997 33 23 The Death of Xenix (1997)
1997 27 3 Myths Over Miami (1997)
1997 26 11 The Long Climb from the Sun’s Core (1997)
1997 13 0 Why Cryptography Is Harder Than It Looks (1997)
1997 12 0 What Is Innovation? (1997)
1997 10 3 Amazon.com High on IPO. So Is Its Valuation. (1997)
1997 5 2 Kasparov Proves No Match for Computer (1997)
1997 3 0 The Alphanum Algorithm (1997)
1998 218 137 America Online to Buy Internet Chat Service for $287 Million (1998)
1998 206 129 Does Gravity Travel at the Speed of Light? (1998)
1998 161 80 American Summer: Before Air-Conditioning (1998)
1998 155 19 The Fallacy of Cracking Contests (1998)
1998 127 81 Uncleftish Beholding: English minus the non-Germanic words (1998)
1998 121 49 Microsoft TerraServer (1998)
1998 107 109 Lisp: A Language for Internet Scripting and Programming (1998) [pdf]
1998 106 52 Yahoo buys Viaweb for $49 million (1998)
1998 84 21 An Interview with the Old Man of Floating-Point (1998)
1998 75 98 Paul Krugman (1998): By 2005 Internet will have no more economic impact than fax
1998 72 36 Contact Yahoo (1998)
1998 65 46 Chaffing and Winnowing: Confidentiality without Encryption (1998)
1998 52 69 How Javas Floating-Point Hurts Everyone Everywhere (1998) [pdf]
1998 51 18 The Elements Of Style: Unix As Literature (1998)
1998 45 15 Yes, there is a better search engine (1998)
1998 32 1 Of mice, men and machines (1998)
1998 22 40 Why most economists’ predictions are wrong (1998)
1998 20 7 The 7 Habits of Highly Dysfunctional Developers (1998)
1998 6 1 Composing Reactive Animations (1998)
1998 6 0 Security Pitfalls in Cryptography (1998)
1998 3 1 The Unfinanced Entrepreneur [1998]
1999 240 108 Why I Wrote PGP (1999)
1999 151 115 Yahoo buys GeoCities (1999)
1999 137 106 The Internet Sucks: Or, What I Learned Coding X-Wing vs. TIE Fighter (1999)
1999 120 56 Hugh Laurie: Wodehouse Saved my Life (1999)
1999 120 42 The In-game Economics of Ultima Online (1999)
1999 108 129 Why didn’t we patent the spreadsheet? Were we stupid? (1999)
1999 79 126 How the Internet ruined San Francisco (1999)
1999 71 13 A bike shed (any colour will do) on greener grass (1999)
1999 66 18 Ted Nelson’s Computer Paradigm Expressed as One-Liners (1999)
1999 63 16 The solitaire encryption algorithm (1999)
1999 61 16 1x Forth by Charles Moore (1999)
1999 47 54 How the Internet Ruined San Francisco (1999)
1999 46 30 Why Should I Care What Color the Bikeshed Is? (1999)
1999 19 7 A Brief History of the Internet (1999)
1999 17 2 Yahoo To Acquire Geocities (1999)
1999 8 0 A History of Shareware (1999)
1999 7 3 Have a Coke, and Big Brother is sure to smile [1999]
1999 6 10 _NSAKEY (1999)
2000 593 332 Curse Of The Gifted (2000)
2000 304 205 Could the eagles have flown Frodo into Mordor? (2000)
2000 180 62 The short, tormented life of computer genius Phil Katz (2000)
2000 161 153 Things You Should Never Do, Part I (2000)
2000 146 101 Paul Graham reviews Structure and Interpretation of Computer Programs (2000)
2000 136 22 CIA Analyst Training Handbook (2000) [pdf]
2000 102 49 Courtney Love does the math (2000)
2000 56 5 The Path to Mastery (2000)
2000 49 20 Systems Software Research is Irrelevant (2000) [pdf]
2000 32 7 Why We Spy on Our Allies (2000)
2000 28 17 Why the future doesn’t need us (2000)
2000 25 9 C/C++/Java have dominated programming for 30 yrs & are at a turning point [2000]
2000 4 1 Jerry Pournelle: How to Get to Space (2000)
2001 322 116 Thousands dead, millions deprived of civil liberties? (2001)
2001 214 250 Dijkstra on Haskell and Java (2001)
2001 180 84 Teach Yourself Programming in Ten Years (2001)
2001 173 28 Bootstrapping a simple compiler from nothing (2001)
2001 169 54 An Engineer’s View of Venture Capitalists (2001)
2001 142 125 “I can’t do math” (2001)
2001 76 19 Handbook of Applied Cryptography (2001)
2001 60 24 Review of Disciplined Minds: A Critical Look at Salaried Professionals (2001)
2001 58 68 Richard Stallman on the Ogg Vorbis license (2001)
2001 46 12 Jonathan Lebed: Stock Manipulator, S.E.C. Nemesis, and 15 (2001)
2001 41 58 Bloatware and the 80/20 Myth (2001)
2001 35 17 RFC 3092 - Etymology of “Foo” (2001)
2001 28 0 Inside Windows Product Activation (2001)
2001 24 11 Decentralism Against Terrorism (2001)
2001 24 4 Ordinary Skill in the Art (2001)
2001 15 1 20 Year Usenet Timeline (2001)
2002 714 284 Forgotten Employee (2002)
2002 486 170 Knuth: Open Letter to Condoleezza Rice (2002)
2002 221 76 Engineering Pornography (2002)
2002 141 118 A Mathematicians Lament (2002) [pdf]
2002 95 47 How to be a Programmer: A Short, Comprehensive, and Personal Summary (2002)
2002 82 31 The Law of Leaky Abstractions (2002)
2002 75 82 Testimony of Ms. Soon Ok Lee (2002)
2002 71 94 Obtaining Antibiotics without a Prescription (2002)
2002 29 46 Intel introduces 3-GHz desktop chip (2002)
2002 23 2 Calculator Forensics (2002)
2002 18 3 Minimalism: Practical Guide to Writing Less Code (2002) [pdf]
2003 160 51 Greetings from the Safari team at Apple Computer (2003)
2003 92 46 Almost Too Beautiful (2003)
2003 90 33 What Every Software Developer Must Know About Unicode (2003)
2003 84 25 Steve Jobs and Jeff Bezos meet “Ginger” (2003)
2003 82 37 How to Make a Complete Map of Every Thought you Think (2003)
2003 80 51 Thwarted Linux backdoor hints at smarter hacks (2003)
2003 76 27 The Art of Picking Intel Registers (2003)
2003 70 31 The Art of Lisp and Writing (2003)
2003 64 19 A dialog on quantum gravity (2003)
2003 60 86 Exceptions (2003)
2003 56 32 Why Events Are A Bad Idea For High-Concurrency Servers (2003)
2003 54 80 Is Math a Young Man’s Game? (2003)
2003 54 8 Gerald Sussman - An Electrical Engineering View of a Mechanical Watch (2003)
2003 51 81 Stop the autoconf insanity Why we need a new build system (2003)
2003 49 56 Email (let’s drop the hyphen) (2003)
2003 26 14 An attempt to backdoor the kernel (2003)
2003 15 8 New Drug Development: Estimating entry from human clinical trials (2003) [pdf]
2003 13 3 How Software Errors Contribute to Spacecraft Failures (2003) [pdf]
2004 450 300 Ten predictions (2004)
2004 312 114 In emergency cases a passenger was selected and thrown out of the plane (2004)
2004 170 285 What You Can’t Say (2004)
2004 167 53 What happens when patients find out how good their doctors really are? (2004)
2004 163 47 How a Swedish engineer saved a once-in-a-lifetime mission to Titan (2004)
2004 112 36 Starbucks Does Not Use Two-Phase Commit (2004)
2004 109 51 How I Explained REST to My Wife (2004)
2004 101 25 Citizen Kubrick (2004)
2004 100 28 Great Programmers (2004)
2004 81 12 The Graphing Calculator Story (2004)
2004 81 9 Tor: The Second-Generation Onion Router (2004)
2004 71 26 How to make wealth (2004)
2004 71 7 Homeland Security: Requirements for Security Decision Support Systems (2004)
2004 69 87 Ancient languages: Perl (2004)
2004 60 48 If carpenters were hired like programmers (2004)
2004 60 7 Popular misconceptions about the Golden Ratio (2004)
2004 53 11 Lock-Free Data Structures (2004)
2004 51 19 Why type systems are interesting (2004)
2004 49 16 The Haskell Road to Logic, Math and Programming (2004) [pdf]
2004 47 54 What the bubble got right (2004)
2004 46 47 Why Learning Assembly Language Is Still a Good Idea (2004)
2004 39 15 Home Built Laser Projector (2004)
2004 33 44 Apple.com (2004)
2004 32 13 How to interpret complex C/C++ declarations (2004)
2004 29 49 The IDE Divide (2004)
2004 29 10 FDR’s policies prolonged Depression by 7 years, UCLA economists calculate (2004)
2004 23 7 A Brief History of Spreadsheets [2004]
2004 21 8 It’s Not Software (2004)
2004 18 3 The Online Disinhibition Effect (2004)
2004 14 11 3129 numbers that unlock keyless entry cars (2004)
2004 14 10 PHP’s Share-Nothing Architecture (2004)
2004 14 9 The Word “Hacker” (2004)
2004 10 6 How Tiny Swiss Cellphone Chips Helped Track Global Terror Web (2004)
2004 8 1 Aristotle (The Knowledge Web) (2004)
2004 5 1 Justin Frankel: The world’s most dangerous geek (2004)
2005 135 60 Lost in the Meritocracy (2005)
2005 124 9 The Feynman File (2005)
2005 105 2 Statistical Data Mining Tutorials (2005)
2005 96 87 Bit gold (2005)
2005 89 31 A Short Talk about Richard Feynman (2005)
2005 87 94 The Emacs Problem (2005)
2005 87 13 Why Lisp macros are cool, a Perl perspective (2005)
2005 85 51 Fictional peer reviews rejecting famous papers (2005)
2005 81 115 Why I Hate Frameworks (2005)
2005 79 35 Rewriting Reddit (2005)
2005 73 82 The Million Dollar Homepage (2005)
2005 68 30 No Housing Bubble Trouble (2005)
2005 61 30 K, by Arthur Whitney (2005)
2005 59 36 Why I Hate Frameworks (2005)
2005 59 7 AES timing variability at a glance (2005)
2005 57 93 Why USB sucks (2005)
2005 56 17 Researchers recover typed text using audio recording of keystrokes (2005)
2005 51 1 NSA’s Project SHAMROCK (2005)
2005 49 5 All Complex Ecosystems Have Parasites (2005)
2005 45 13 [2005] Response from Pirate Bay to Apple on Intellectual Property Dissemination
2005 37 24 The Calculus Trap (2005)
2005 37 9 Why Good Programmers are Lazy and Dumb (2005)
2005 31 6 Foolproof: A Sampling of Mathematical Folk Humor (2005) [pdf]
2005 30 31 Bernanke: There’s No Housing Bubble to Go Bust (2005)
2005 29 3 Rumor Monger (2005)
2005 26 7 Lots of Irritating Spurious Parentheses (2005)
2005 25 13 Why Smart People Have Bad Ideas [2005]
2005 22 7 Japan, Refutation of Neoliberalism (2005)
2005 18 5 The Tyranny of Tyranny (2005)
2005 10 7 Waist-to-Tallness Ratio May Measure Risk Better Than Body Mass Index (2005)
2005 10 4 Is Linux For Losers? Theo De Raadt’s opinion (2005)
2005 7 3 David Oreck Moves the Air (2005)
2005 7 1 Initial revision of “git”, the information manager from hell (2005)
2005 6 2 About TechCrunch (2005)
2005 4 1 Remarks at NBER Conference on Diversifying the Science and Eng Workforce (2005)
2006 337 174 The Secret Tesla Motors Master Plan (2006)
2006 208 160 How Google keeps employees by treating them like kids (2006)
2006 179 33 Writing device drivers in Linux: A brief tutorial (2006)
2006 176 106 Tcl the misunderstood (2006)
2006 156 62 Senator Biden On NSA Database (2006) [video]
2006 140 41 Source of the famous Now you have two problems quote (2006)
2006 132 24 Andrew Mason asking for advice on “selling a website idea” (2006)
2006 117 45 Tcl the misunderstood (2006)
2006 111 23 What Gives Gold that Mellow Glow? (2006)
2006 110 27 The Ten Commandments of Egoless Programming (2006)
2006 101 14 NSA has massive database of Americans’ phone calls (2006)
2006 89 66 Execution in the Kingdom of Nouns (2006)
2006 87 3 The Eternal Value of Privacy (2006)
2006 69 83 Has Joel Spolsky Jumped the Shark? (2006)
2006 68 85 Object-Relational Mapping is the Vietnam of Computer Science (2006)
2006 68 5 An Algorithm for Compressing Space and Time (2006)
2006 66 8 Peter Norvig’s Address at the UC Berkeley Computer Science Commencement (2006)
2006 63 46 Lisp is Not an Acceptable Lisp (2006)
2006 63 40 Blog Or Get Off The Pot (2006)
2006 62 46 Nearly All Binary Searches and Mergesorts are Broken (2006)
2006 57 29 Matz: Ruby’s Lisp features (2006)
2006 45 56 The shady one-man corporation that’s destroying hip-hop (2006)
2006 45 50 Wikipedia Will Fail in Four Years (2006)
2006 44 8 Web Design is 95% Typography (2006)
2006 40 49 Rsync.net Warrant Canary (2006)
2006 40 48 Why learning Haskell/Python makes you a worse programmer (2006)
2006 40 5 The Power of the Marginal (2006)
2006 36 20 Division By Three (2006)
2006 27 5 We Tried Baseball and It Didnt Work (2006)
2006 20 1 The Mysterious Smell of Moondust (2006)
2006 16 6 Has Joel Spolsky Jumped the Shark? (2006)
2006 15 7 The Guerrilla Guide to Interviewing (2006)
2006 9 2 Nearly All Binary Searches and Mergesorts are Broken (2006)
2006 3 0 Reverse Engineering Machines with the Yoneda Lemma (2006)
2007 230 235 The $200 Billion Rip-Off: Our broadband future was stolen (2007)
2007 217 74 The Strange Story of Dual_EC_DRBG suspected NSA backdoor (2007)
2007 205 41 Top ten algorithms in data mining (2007) [pdf]
2007 204 101 Holding a Program in One’s Head (2007)
2007 190 94 CPU reliability Linus Torvalds (2007)
2007 176 32 Did NSA Put a Secret Backdoor in New Encryption Standard? (2007)
2007 169 77 Bayes’ rule in Haskell (2007)
2007 166 181 Microsoft is Dead (2007)
2007 165 93 Did NSA Put a Secret Backdoor in New Encryption Standard? (2007)
2007 142 65 How the CIA Used a Fake Sci-Fi Flick to Rescue Americans From Tehran (2007)
2007 118 90 Stuff (2007)
2007 117 46 Encrypted E-Mail Company Hushmail Spills to Feds (2007)
2007 114 125 Apple iPhone Will Fail in a Late, Defensive Move (2007)
2007 106 13 A Visual Explanation of SQL Joins (2007)
2007 96 118 My Son Won’t Do His Homework (2007)
2007 93 51 Chernobyl Fungus Feeds On Radiation (2007)
2007 92 72 The Pedal-to-the-Metal, Totally Illegal, Cross-Country Sprint for Glory (2007)
2007 92 52 The Dark Side of C++ (2007) [pdf]
2007 88 21 A Story of Surveillance (2007)
2007 87 45 A regular expression matcher By Rob Pike and Brian Kernighan (2007)
2007 87 13 AT&T Invents Programming Language for Mass Surveillance (2007)
2007 84 21 Warning Signs in Experimental Design and Interpretation (2007)
2007 74 38 The Twilight Years of Cap’n Crunch (2007)
2007 72 7 Chemical weapons dumped in the Baltic sea (2007) [pdf]
2007 69 53 Nuclear plants release less radiation into environment than coal plants (2007)
2007 67 38 The Inverse Power of Praise (2007)
2007 67 19 How to Write a Spelling Corrector (2007)
2007 63 48 Introduction to MIPS assembly language (2007)
2007 63 35 Obama pledges Net neutrality laws if elected president (2007)
2007 53 14 Webserver in bash (2007)
2007 49 3 AT&T gave feds access to all Web, phone traffic, ex-tech says (2007)
2007 45 20 Guide to cryptographic hashes for content-based addressing (2007)
2007 42 4 Obama’s Speech at Woodrow Wilson Center (2007)
2007 37 6 Write Articles, Not Blog Postings (2007)
2007 32 59 How To Do Philosophy (2007)
2007 31 42 An Alternative Theory of Unions [2007]
2007 25 24 16 bits per second - the bandwidth of consciousness (2007)
2007 24 12 Apple iPhone Will Fail in a Late, Defensive Move (2007)
2007 23 3 Amazon one-click patent rejected by the USPTO as a result of my request (2007)
2007 19 19 A response to Linus Torvalds on C++ (2007)
2007 16 14 Is There Anything Good About Men? (2007)
2007 16 9 Hocus-Pocus, and a Beaker of Truffles (2007)
2007 8 1 San Francisco: Protected tenants and what you need to know (2007)
2007 6 0 The only thing that matters (2007)
2007 5 0 Peter Norvig on The History and Future of Technological Change (2007)
2007 4 1 Mother Teresa’s Crisis of Faith [2007]
2008 572 299 Obama: No warrantless wiretaps if you elect me (2008)
2008 290 225 Linux is not about choice (2008)
2008 265 88 How I Turned Down $300,000 from Microsoft to go Full-Time on GitHub (2008)
2008 241 217 How can C Programs be so Reliable? (2008)
2008 208 195 Association between muscular strength and mortality in men (2008) [pdf]
2008 207 49 What does “HREF” stand for? (2008)
2008 205 52 Mona Lisa in 50 polygons, using a genetic algorithm (2008)
2008 196 126 So what’s wrong with 1975 programming? (2008)
2008 175 121 Cities and Ambition (2008)
2008 166 113 GnuTLS considered harmful (2008)
2008 165 126 The Narcissism of Small Code Differences (2008)
2008 164 34 The forbidden railway: Vienna - Pyongyang (2008)
2008 162 22 Ten Years of Purely Functional Data Structures (2008)
2008 161 39 Top Algorithms in Data Mining (2008) [pdf]
2008 155 16 Operating System Development Series (2008)
2008 133 131 Rent-a-coder hilarity (2008)
2008 126 100 From Mr Average to Superman: Craig Davidson’s account of using steroids (2008)
2008 121 48 Taboo Your Words (2008)
2008 118 38 Perl Cannot Be Parsed: A Formal Proof (2008)
2008 113 96 Why Doesn’t Anyone Give a Crap About Freedom Zero? (2008)
2008 100 98 The Innumeracy of Intellectuals (2008)
2008 99 11 Inside Account of U.S. Eavesdropping on Americans (2008)
2008 91 34 Star Trek 1971 Text Game (2008)
2008 89 49 Why monads have not taken the Common Lisp world by storm (2008)
2008 81 113 The Year of Dressing Formally (2008)
2008 81 32 Japanese peer-to-peer (2008)
2008 74 32 Dont Hash Secrets (2008)
2008 71 40 Now 0-for-3, SpaceX’s Elon Musk Vows to Make Orbit (2008)
2008 66 72 Coding Horror: The Magpie Developer (2008)
2008 64 7 A Practical Computer Science Primer (2008)
2008 63 48 Why monads have not taken the Common Lisp world by storm (2008)
2008 63 15 Generating Complex Procedural Terrains Using the GPU (2008)
2008 63 5 Things Caches Do (2008)
2008 57 20 What is a y-combinator? (2008)
2008 57 15 The Myth of Multitasking (2008) [pdf]
2008 45 32 Sitting straight ‘bad for backs’ (2008)
2008 43 35 The Simple Truth (2008)
2008 41 33 Monads are a Class of Hard Drugs (2008)
2008 39 6 IN/MSX: Running 4 Copies of an Operating System at Once (2008)
2008 36 51 Empiricism Is Not a Matter of Faith (2008) [pdf]
2008 36 8 Interview with Donald Knuth (2008)
2008 35 13 Random Number Bug in Debian Linux (2008)
2008 27 51 Remember Smalltalk? (2008)
2008 27 42 CSS ‘frameworks’ are missing the point (2008)
2008 25 1 Time on the Horizon Graphing time series on one line (2008) [pdf]
2008 24 12 How to write concurrent programs and why you shouldn’t [2008]
2008 20 8 Bacteria evolve; Conservapedia demands recount [2008]
2008 14 1 The word “intuitive” isn’t (2008)
2008 13 46 Rename “master/slave” terminology to “client/server” (2008)
2008 12 2 Seeking Anonymity in an Internet Panopticon (2008) [pdf]
2008 10 4 The death of index investing (2008)
2008 10 2 Architecture of The Internet Archive [2008]
2008 7 7 Git is the next Unix (2008)
2008 3 0 Summon Monsters? Open The Door? Heal? Or Die? (2008)
2009 506 37 The First Few Milliseconds of an HTTPS Connection (2009)
2009 435 383 The Elves Leave Middle Earth Sodas Are No Longer Free (2009)
2009 360 190 Facebook turned me down (2009)
2009 337 124 Intel’s “cripple AMD” function (2009)
2009 287 104 37signals valuation tops $100 billion after bold VC investment (2009)
2009 225 169 Not Lisp again (2009)
2009 225 81 Linus on keeping a clean git history (2009)
2009 210 50 Linus on git rebase and merge (2009)
2009 205 32 A Brief, Incomplete, and Mostly Wrong History of Programming Languages (2009)
2009 201 89 Keep Your Identity Small (2009)
2009 193 178 OpenSSL is written by monkeys (2009)
2009 159 98 Sugar, acid and teeth (2009)
2009 159 35 Books of a Highly Effective Programmer (2009)
2009 151 24 Plain English explanation of Big O? (2009)
2009 149 83 Qian Xuesen dies at 98; Co-Founder of JPL and China’s space program (2009)
2009 144 106 The Anatomy of an Entrepreneur (2009)
2009 140 121 The Worst-Run Big City in the U.S. San Francisco (2009)
2009 140 36 A Unix Utility You Should Know About: Netcat (2009)
2009 136 39 Letter from the grave (2009)
2009 132 104 What is the best way to programatically detect porn images? (2009)
2009 127 56 LavaBit’s Architecture (2009)
2009 124 8 A Stick Figure Guide to the Advanced Encryption Standard (2009)
2009 122 65 Co-routines as an alternative to state machines (2009)
2009 108 24 Jan Koum promoting WhatsApp in the Flyertalk forum (2009)
2009 106 25 Technology is Heroin (2009)
2009 97 37 Levels of programmers (2009)
2009 97 31 Oberon (2009)
2009 96 62 How does our language shape the way we think? (2009)
2009 94 42 Why Twitter is a Big Deal (2009)
2009 84 48 Linux Kernel Modules in Haskell (2009)
2009 83 25 The One in Which I Call Out Hacker News (2009)
2009 74 50 How powerful was the Apollo 11 computer? (2009)
2009 73 33 Netflix’s Culture Document (2009)
2009 70 61 Why Did Symbolics Fail? (2009)
2009 70 21 Announcing your plans makes you less motivated to accomplish them (2009)
2009 68 11 SICP distilled (2009)
2009 67 26 Introducing Ring -3 Rootkits: BIOS rootkit targeting vPro chipsets (2009) [pdf]
2009 65 24 Go Data Structures (2009)
2009 65 24 Soros: General Theory of Reflexivity (2009)
2009 52 44 Soy’s Negative Effects (2009)
2009 51 40 Cryptographic Right Answers (2009)
2009 49 16 ST-09-0002 NSA/CSS OIG Draft about Stellar Wind (2009) [pdf]
2009 49 10 E-Mail Surveillance Renews Concerns in Congress (2009)
2009 47 16 The Believer (2009)
2009 46 34 Why Apple Will Never Make Printers Again (2009)
2009 46 11 Racing the Beam (2009)
2009 45 6 The Lost History of Helmand (2009)
2009 45 3 Go Data Structures: Interfaces (2009)
2009 44 4 Maps Hidden in Monopoly Helped World War II POWs Escape (2009)
2009 43 19 Writing unit tests is reinventing functional programming (2009)
2009 40 50 The Strategic Consequences of F-22 Termination (2009)
2009 39 3 Natural Language Corpus Data (2009) [pdf]
2009 39 2 Organizing Functional Code for Parallel Execution, Guy Steele (2009) [video]
2009 38 56 Apple’s Mistake (2009)
2009 36 23 Worst time to join a startup is right after it gets initial VC financing (2009)
2009 31 56 The danger of “language” in programming (2009)
2009 29 66 Why Minds Are Not Like Computers (2009)
2009 28 7 Software Updates: Courgette (2009)
2009 27 7 Go: “I have already used the name for MY programming language” (2009)
2009 26 28 Why not port the Linux kernel to Common Lisp? (2009)
2009 25 35 Has the time come to kill the Remember Me checkbox? (2009)
2009 25 8 Story Behind The Secret History of Silicon Valley Part IV (2009)
2009 24 3 To Scheme, or Not to Scheme (2009)
2009 20 2 Understanding the Y Combinator using Java (2009)
2009 20 0 Rich Hickey and Brian Beckman - Inside Clojure (2009) [video]
2009 17 10 Introducing the Google Chrome OS (2009)
2009 16 1 More Thoughts on CPU backdoors (2009)
2009 15 13 NSA could have prevented 9/11 hijackings (2009)
2009 13 41 The Best and Worst Jobs in the U.S. (2009)
2009 13 6 Why would you not want to use Cloud Computing? (2009)
2009 13 5 YC RFS: Things Built on Twitter [2009]
2009 12 1 Python Generator Hacking (2009)
2009 12 0 My Name is Roger, and I’m an alcoholic (2009)
2009 11 0 Bayesian or Frequentist, Which Are You? (2009) [video]
2009 9 1 Rebuttal to Stallmans Story About The Formation of Symbolics and LMI (2009)
2009 8 1 July 22, 1962: Mariner 1 Done In by a Typo (2009)
2009 7 2 Dont Mawk Awk (2009)
2009 7 1 The Sad Tragedy of Micro-Optimization Theater (2009)
2009 6 3 The $300 Million Button (2009)
2009 6 0 The Problems of Open Source (2009)
2010 634 141 Tron Legacy (2010)
2010 475 127 Why GNU grep is fast (2010)
2010 416 103 The day Steve Jobs dissed me in a keynote (2010)
2010 257 56 On 81st birthday, Oregon man gives company to employees (2010)
2010 247 288 Why Chinese Is So Damn Hard (2010)
2010 215 50 Tarkovsky Films Free Online (2010)
2010 200 169 Much of what investment bankers do is socially worthless (2010)
2010 193 49 Genetic Algorithms Produce Winning StarCraft II Build Order (2010)
2010 186 44 How to Minimize Politics in Your Company (2010)
2010 184 71 How to Make Perfect Thin and Crisp French Fries (2010)
2010 179 39 What Broke My Father’s Heart (2010)
2010 173 120 High-fructose corn syrup prompts considerably more weight gain than sugar (2010)
2010 160 63 How to Detect a Toxic Customer (2010)
2010 138 107 Emacs is Dead (2010)
2010 137 128 Deconstructing K&R C (2010)
2010 137 24 Fuck the Super Game Boy: Introduction (2010)
2010 135 72 Has Amazon EC2 become over subscribed? (2010)
2010 120 58 Computing 10,000X more efficiently (2010) [pdf]
2010 113 61 No One Knows What They’re Doing (2010)
2010 109 102 4chan source code leaked (2010)
2010 107 38 Disqus: Scaling the Worlds Largest Django Application (2010) [video]
2010 100 24 Terry Tao on how to compute non-converging infinite sums (2010)
2010 99 78 How I Cured my RSI Pain (2010)
2010 94 32 Will It Optimize? See how well you can anticipate gcc’s optimizer (2010)
2010 94 20 B-Heap vs. Binary Heap (2010)
2010 89 30 Map Reduce: A simple introduction (2010)
2010 83 72 Record IQ is just another talent (2010)
2010 81 64 How I became a con artist (2010)
2010 80 55 “Future of JavaScript” doc from our internal “JavaScript Summit” (2010)
2010 76 15 Explained: The Shannon Limit (2010)
2010 75 88 Doctoral degrees: The disposable academic (2010)
2010 75 75 Everyone Who Tried to Convince Me to use Vim was Wrong (2010)
2010 74 65 29% of Bay Area’s particulate air pollution comes from across the Pacific (2010)
2010 69 44 The Most Influential Books Ever Written (2010)
2010 68 32 Even Knowingly Taking A Placebo Seems To Help (2010)
2010 68 30 Stray Dogs Master Complex Moscow Subway System (2010)
2010 67 74 Why CPUs aren’t getting any faster (2010)
2010 67 43 Everybody thinks about garbage collection the wrong way (2010)
2010 67 35 We have an employee whose last name is Null (2010)
2010 67 17 What’s new in purely functional data structures since Okasaki? (2010)
2010 59 81 Is Employer-Based Health Insurance A Barrier To Entrepreneurship? (2010)
2010 59 14 Goodbye Microsoft, Hello Facebook (2010)
2010 58 20 Accuracy takes power: a 3GHz quest to build a perfect SNES emulator (2010)
2010 54 42 Our universe within a larger universe? So suggests wormhole research (2010)
2010 53 113 Jwz and Brendan Eich discuss the origins of JavaScript (2010)
2010 50 68 Everest is littered with dead, exposed bodies [2010]
2010 49 30 Re: [mongrel2] C versus C++ (2010)
2010 48 15 A successful Git branching model (2010)
2010 47 36 Why Distributed Teams are Less Effective (2010)
2010 47 14 Dear Google: Please fork WebKit (2010)
2010 46 19 If you arent getting rejected, your goals arent ambitious enough (2010)
2010 44 45 History of Emacs vi Keys (Keyboard Influence on Keybinding Design) (2010)
2010 44 23 Bootstrap or Die - Lessons Learned From a Web Startup’s Murder/Suicide (2010)
2010 42 81 When you see a Heisenbug in C, change your compiler’s optimization level (2010)
2010 42 63 Everything You Know About Fitness Is a Lie (2010)
2010 42 20 What is the theoretical maximum number of open TCP connections? (2010)
2010 41 56 The Disposable Academic: Why doing a PhD is often a waste of time (2010)
2010 41 25 Pizza for bitcoins? [2010]
2010 36 35 A Batesian Mimicry Explanation of Business Cycles (2010)
2010 35 11 Fast interprocess messaging (2010)
2010 35 9 An Analysis of Linux Scalability to Many Cores (2010) [pdf]
2010 34 4 Well, These New Zuckerberg IMs Won’t Help Facebook’s Privacy Problems (2010)
2010 32 34 Dont Use Try/Catch (2010)
2010 32 5 A Call for Continued Open Standards and Neutrality (2010)
2010 31 48 Don’t Blame Your Community: Ad Blocking Is Not Killing Any Sites (2010)
2010 29 23 I Quit Hacker News (2010)
2010 29 8 Game of Life News: Prime numbers (2010)
2010 28 4 Google’s internal spy system was Chinese hacker target (2010)
2010 27 8 A Brief, Incomplete, and Mostly Wrong History of Programming Languages (2010)
2010 27 3 Software For Underserved Markets [2010]
2010 27 2 ‘John Doe’ Who Fought FBI Spying Freed From Gag Order After 6 Years [2010]
2010 26 66 Intel wants to charge $50 to unlock stuff your CPU can already do (2010)
2010 25 13 Super-secret debug capabilities of AMD processors (2010)
2010 25 8 Analysis vs Algebra predicts eating corn? (2010)
2010 24 5 Duplicates existing functionality (2010)
2010 22 23 When You Kill Ten Million Africans You Aren’t Called ‘Hitler’ (2010)
2010 22 7 Strace - The Sysadmin’s Microscope (2010)
2010 22 6 Notes from a production MongoDB deployment (2010)
2010 21 18 The decline effect and the scientific method (2010)
2010 21 6 How Geckoboard got their first 2000 beta users (2010)
2010 14 0 (2010) Taco Bell Programming
2010 13 0 Calling Python Libraries from Haskell (2010)
2010 12 9 Imagine there’s no Army (2010)
2010 12 4 The Other L-Word (2010)
2010 12 2 MySQL in the cloud at Airbnb (2010)
2010 11 4 GitHub Sucks (2010)
2010 8 0 Read this before submitting a conference proposal (2010)
2010 6 6 Do Intelligent People Drink More Alcohol? (2010)
2010 6 3 How to Avoid Mediocre Co-Founders (2010)
2010 6 2 Is there a backdoor in Truecrypt? (2010)
2010 6 0 Amd64 and Va_arg (2010)
2010 5 2 Indias Need for Sound Standards for Examining Rape Survivors (2010)
2010 5 0 The Iliad and what it can still tell us about war (2010)
2010 4 2 Arduino The Documentary (2010) English HD
2010 4 0 JavaScript Module Pattern (2010)
2010 3 2 Be Careful not to Become a Conference Ho (2010)
2010 3 0 What Happened to Yahoo (2010)
2011 678 323 Everything You Know About Fitness is a Lie (2011)
2011 629 193 Fucking Sue Me (2011)
2011 448 153 Fabrice Bellard: Portrait of a super-productive programmer (2011)
2011 407 99 Fake Bus Stops For Alzheimers patients in Germany (2011)
2011 386 72 JustFab.com JustFabulous Class Action Lawsuit (2011)
2011 287 259 Drugs and the Meaning of Life (2011)
2011 267 57 Why Privacy Matters Even if You Have ‘Nothing to Hide’ (2011)
2011 265 235 Deep C and C++ (2011)
2011 260 47 Uncovering an advertising fraud scheme (NSFW) (2011)
2011 221 17 Aaron Swartz v. United States (2011)
2011 220 43 Coffee and its Effects on Feature Creep (2011)
2011 219 74 The bomb that changed my life (2011)
2011 214 217 Why Russians Are Not Smiling (2011)
2011 212 112 What happens after Yahoo acquires you (2011)
2011 199 163 Why ‘Passive Income’ Is A Dangerous Fantasy (2011)
2011 196 40 Rel=”logo” (2011)
2011 184 123 My Doctor’s Office Asked me to Lie (2011)
2011 181 77 Real pixel coding (2011)
2011 177 42 Why does HTML think chucknorris is a color? (2011)
2011 176 114 Illegally climbing the Golden Gate bridge at dawn (2011)
2011 176 63 How to travel around the world for a year (2011)
2011 169 57 Watch a VC use my name to sell a con (2011)
2011 169 25 Microsoft admits Patriot Act can access EU-based cloud data (2011)
2011 168 83 A Tmux Crash Course (2011)
2011 167 64 The Day our investors came to see the office (2011)
2011 149 59 The Coming War on General Computation (2011)
2011 148 33 The Most Difficult CEO Skill? Managing Your Own Psychology (2011)
2011 146 42 The Soviet Superplane Program That Rattled Area 51 (2011)
2011 143 95 What is the best comment in source code you have ever encountered? (2011)
2011 141 35 Bored people quit (2011)
2011 137 69 How I Got Kicked Out of Y Combinator and Then Raised $6.5m for My Startup (2011)
2011 134 85 Nerds, we need to have a talk (2011)
2011 130 90 1% of CMS-Powered Sites Expose Their Database Passwords (2011)
2011 130 41 Theres a Secret Patriot Act, Senator Says (2011)
2011 129 85 Are Current Web Design Trends Pushing Us Back to 1999? (2011)
2011 128 94 How Doctors Die (2011)
2011 127 135 How Class-based Programming Sucks (2011)
2011 127 58 Users of my iOS Game Teach Me a Lesson MIT Didnt (2011)
2011 126 43 How and Why We Switched from Erlang to Python (2011)
2011 124 57 I’m the guy who bought 259684 Bitcoins for under $3000 yesterday (2011)
2011 122 68 Stackoverflow abuses nofollow (2011)
2011 120 113 Why Developers Don’t Want to Work on Your Idea (2011)
2011 120 45 A Cosmonaut’s Fiery Death Retold (2011)
2011 119 46 Lead Bullets (2011)
2011 117 115 You are not a software engineer (2011)
2011 117 57 Things That Turbo Pascal is Smaller Than (2011)
2011 117 20 How secure is HTTPS today? How often is it attacked? (2011)
2011 116 117 Why Lisp is a Big Hack and Haskell is Doomed to Succeed (2011)
2011 115 65 Joel Sposky’s Take On Equity Allocation In A New Software Startup (2011)
2011 111 22 Donut math: how donut.c works (2011)
2011 110 34 Surprising magnetic effect of light discovered at University of Michigan (2011)
2011 108 81 Why I’m Furious with Silicon Valley (2011)
2011 108 61 The origin of log in (2011)
2011 107 108 Open Letter to My Students: No, You Cannot be a Professor (2011)
2011 99 33 The Great Shift in Japanese Pop Culture (2011)
2011 99 17 A Practical Guide to Web App Success (2011) now free and CC licensed
2011 96 19 Dissecting the GZIP format (2011)
2011 93 14 The man who won the right to discuss his National Security Letter (2011)
2011 89 87 Paul Allen: The Singularity Isn’t Near (2011)
2011 85 57 Never Make Counter-Offers (2011)
2011 83 41 How I Made $350 In Two Days With Three Pages and Some Payment Code (2011)
2011 83 31 Bodies hanging from bridge in Mexico are warning to social media users (2011)
2011 80 32 Hacker Typer: How To Look Insanely Busy In A Coffee Shop (2011)
2011 80 9 Super Mario Melodies (2011)
2011 78 60 Sanskrit and Lisp (2011)
2011 77 91 A man, a Plan. No canals (2011)
2011 74 52 Applying to Ph.D. Programs in Computer Science (2011) [pdf]
2011 74 35 A Brief Rant on the Future of Interaction Design (2011)
2011 74 20 Where’s The Octopus? (2011) [video]
2011 73 62 Of Lisp Macros and Washing Machines (2011)
2011 73 26 BufferBloat: What’s Wrong with the Internet? (2011)
2011 73 12 Dennis Ritchie passes away at 70 (2011)
2011 70 29 Creating a simple blog system with a 500-line bash script (2011)
2011 69 53 Is it OK to Hire People from Your Friends Company? (2011)
2011 68 11 Dizzying but invisible depth (2011)
2011 67 25 Goodbye academia, I get a life (2011)
2011 61 38 Motorola releases fingerprint sensor-embedded Android phone (2011)
2011 60 42 The End of the Future (2011)
2011 59 70 Why 3D Doesn’t Work and Never Will (2011)
2011 59 4 Brooks, Friedman, and the banal authoritarianism of do-something punditry (2011)
2011 55 32 How one tiny hyphen destroyed our SEO efforts (2011)
2011 54 13 How to Downsize a Transport Network: The Chinese Wheelbarrow (2011)
2011 54 6 Designing JS promises (2011)
2011 53 52 The Most Expensive One-byte Mistake (2011)
2011 52 22 Dont Add Features to Make Customers Happy (2011)
2011 50 20 Willpower: Its in Your Head (2011)
2011 49 43 The Lost Art of Pickpocketing (2011)
2011 48 59 Is Lisp still useful in today’s world? (2011)
2011 48 16 Why Startups Fail: An Analysis of Post-Mortems (2011)
2011 46 30 Apple’s aesthetic dichotomy (2011)
2011 46 22 Supreme Court shields prosecutors in wrongful convictions (2011)
2011 45 45 Dont call yourself a programmer (2011)
2011 45 24 What Happens to Asian-American Overachievers When the Test-Taking Ends? (2011)
2011 45 13 Naurs Programming as Theory Building (2011)
2011 42 49 Kurzweil Responds: Don’t Underestimate the Singularity (2011)
2011 42 34 Is Hungarian notation a workaround for insufficient type systems? (2011)
2011 42 16 6 Lessons from Dropbox - One Million Files Saved Every 15minutes (2011)
2011 42 15 On not hiring (2011)
2011 41 24 Why does subtracting these two times give a strange result? (2011)
2011 40 22 Measure Anything, Measure Everything (2011)
2011 38 46 GitHub and BitBucket (2011)
2011 37 41 Builder Blames Navy as Brand-New Warship Disintegrates (2011)
2011 36 13 SockJS WebSocket emulation (2011)
2011 34 47 Dangerous Embedded C Coding Standard Rules (2011)
2011 34 17 A map of the languages of the USA (2011)
2011 34 5 Why game industry talent is going indie (2011)
2011 34 0 False Sharing (2011)
2011 32 13 How the Telecom Lobby is Killing Municipal Broadband (2011)
2011 32 5 Dealing With (Not Dealing With) the Open SourceAssholes (2011)
2011 30 68 Tobacco increases work capacity (2011)
2011 30 2 Bitcoin, what took ye so long? (2011)
2011 29 11 Vim Revisited (2011)
2011 29 6 Understanding the Fourier transform (2011)
2011 28 12 The History of Why Im Tired of Your Modern Shooters (2011)
2011 27 31 Should We Abolish User Access to rm? (2011)
2011 27 10 Comparing Low-Power Wireless Technologies (2011)
2011 26 19 Generator For Fullwidth Characters (2011)
2011 25 23 FreeBSD: A Faster Platform For Linux Gaming Than Linux? (2011)
2011 25 12 Scala at Yammer (2011)
2011 23 10 Mac OS X - The state of the file system (2011)
2011 23 9 Clojure and Complexity (2011)
2011 23 3 Coffee and its Effects on Feature Creep (2011)
2011 22 12 The Internal Clitoris, which wasn’t properly mapped until 2009 (2011)
2011 21 60 Krugman on Bitcoin’s problems with deflation (2011)
2011 21 9 How to Value Your Startup Business (2011)
2011 21 6 Asynchronous I/O in Windows for Unix Programmers (2011)
2011 20 8 The Strange Past and Promising Future of the Lobotomy (2011)
2011 19 22 Anonymous RIM Employee Blasts Company in Open Letter (2011)
2011 18 35 Pitfalls in C and C++: Unsigned Types (2011)
2011 18 16 The Bitcoin Crypto-Currency Mystery Reopened (2011)
2011 18 6 Gamers solve problem in AIDS research that puzzled scientists for years (2011)
2011 18 3 Esmerelda’s Imagination (2011)
2011 16 7 Pump Up the Storage (2011)
2011 14 14 How To Drink Gatorade (2011)
2011 14 0 How to use metrics in a startup (2011)
2011 12 9 Google gets patent for its doodles (2011)
2011 12 2 Quoras Technology Examined (2011)
2011 12 2 Orman: a lightweight SQLite & MySQL ORM for Android (2011)
2011 11 1 Hexbins (2011)
2011 11 1 There is only one cloud icon in the entire universe [2011]
2011 10 6 The Accidental Universe: Sciences crisis of faith (2011)
2011 10 3 The Rise of the New Global Elite (2011)
2011 10 2 Cassandra vs MongoDB vs CouchDB vs Redis vs Riak vs HBase vs… (2011)
2011 9 1 Fundamentals and Experiments of Line Scan Camera (2011)
2011 8 1 Pac Mans split screen bug analyzed and fixed (2011)
2011 7 1 Withdrawing from Hacker News (2011)
2011 6 0 Anatomy of a Crushing [2011]
2011 4 0 How to do Sponsored Posts Without Selling Your Soul (2011)
2011 4 0 Bad Education (2011)
2011 3 1 Izu Islands Gas Masks Obligatory (2011)
2012 625 232 We have an employee whose last name is Null. He kills our employee lookup (2012)
2012 384 112 Why I left Google (2012)
2012 353 54 NSA Chief Denies Domestic Spying Story (2012)
2012 323 164 A farewell to bioinformatics (2012)
2012 288 145 Americas Shameful Human Rights Record (2012)
2012 247 22 Feds go overboard in prosecuting information activist (2012)
2012 238 125 We work a 4-day week and just raised $4.75m (2012)
2012 232 14 Y Not Adventures in Functional Programming (2012)
2012 225 270 Less is exponentially more (2012)
2012 215 202 Why Anti-Authoritarians are Diagnosed as Mentally Ill (2012)
2012 210 36 Modern Microprocessors: A 90 Minute Guide (2012)
2012 206 147 The greatest mystery of the Inca Empire was its strange economy (2012)
2012 197 78 Codebreaker found in bag attended US security conference before death (2012)
2012 187 163 Get that job at Facebook (2012)
2012 181 170 College was my biggest mistake (2012)
2012 176 45 Why HTTP/2.0 does not seem interesting (2012)
2012 174 65 You are committing a crime right now (2012)
2012 173 167 MVC is dead, it’s time to MOVE on (2012)
2012 165 62 Design tip: Never use black (2012)
2012 162 98 A year without food (2012)
2012 162 77 Programming and Depression (2012)
2012 159 68 If correlation doesnt imply causation, then what does? (2012)
2012 146 119 What is a Full Stack developer? (2012)
2012 141 36 Why Concatenative Programming Matters (2012)
2012 141 32 The $4 Million Complaint Call (2012)
2012 140 113 Dash-cams: Russias Last Hope For Civility And Survival On The Road (2012)
2012 137 98 The Mathematical Hacker (2012)
2012 129 64 Julia, I love you (2012)
2012 128 81 Scaling to millions of simultaneous connections (2012) [pdf]
2012 122 58 How We Unexpectedly Got 60K Users in 60 Hours (2012)
2012 121 25 The Haskell School of Music (2012) [pdf]
2012 117 57 Fun Things to do with a Raspberry Pi (2012)
2012 116 42 John Carmack discusses the art and science of software engineering (2012)
2012 111 42 A Slashdot comment on Google Fiber “no servers” clause (2012)
2012 111 16 Of Wizards and Magical Machines (2012)
2012 108 52 Developer depression: Isolation is the biggest problem (2012)
2012 108 22 The Six Stages of Debugging (2012)
2012 108 21 Time to come Clean Motorola (2012)
2012 107 95 How Corruption Is Strangling U.S. Innovation (2012)
2012 105 112 Why having an MBA is a negative hiring signal for startups (2012)
2012 105 37 The Effects of Computer Programming on the Brain (2012)
2012 104 119 Why I should have written ZeroMQ in C, not C++ (2012)
2012 104 76 Fixing Unix Filenames (2012)
2012 103 54 Relationships between Depression and High Intellectual Potential (2012)
2012 102 90 Extra Virginity: The Sublime and Scandalous World of Olive Oil (2012)
2012 102 30 The Stanford Academic Who Wrote Google Its First Check (2012)
2012 100 119 JFKs teen mistress addresses relationship inmemoir (2012)
2012 98 67 Unemployed Black Woman Pretends to be White, Job Offers Skyrocket (2012)
2012 97 22 The Making of Dwarf Fortress (2012)
2012 92 75 Why we don’t sell ads (2012)
2012 92 68 Python’s Hardest Problem (2012)
2012 92 30 C as an intermediate language (2012)
2012 90 22 Journey for PS3: Strange Game (2012)
2012 89 23 ClojureScript: Things That Might Worry You, but Shouldn’t (2012)
2012 88 9 Hello JIT World: The Joy of Simple JITs (2012)
2012 87 6 Why Bloom filters work the way they do (2012)
2012 86 50 Mobile app startups are failing like its 1999 (2012)
2012 86 23 The Art of Rendering (2012)
2012 85 78 Winamps woes: how the greatest MP3 player undid itself (2012)
2012 84 86 Independently Poor: A Twist on FU Money. Or: “FU, Money” (2012)
2012 84 45 Optimizing Your Industry to the Point of Suicide (2012)
2012 80 26 Contribute to Open Source without Being a Programming Genius (2012)
2012 79 33 The Gentleperson’s Guide To Forum Spies (2012)
2012 79 5 GitHub’s CSS Performance (2012)
2012 78 21 FedEx DVDs held at U.S. Customs until video declaration form completed (2012)
2012 74 40 Americans Are as Likely to Be Killed by Their Furniture as by Terrorism (2012)
2012 74 20 An Introduction to Lock-Free Programming (2012)
2012 71 24 Fear and Loathing in Programming La La Land (2012)
2012 70 10 Mind Management, Not Time Management (2012)
2012 69 76 The Fireplace Delusion (2012)
2012 67 26 How and why writing crypto is hard (2012)
2012 67 15 Peter Thiels CS183: Class 13 Notes You Are Not A Lottery Ticket (2012)
2012 66 18 Comparison of Matlab, R, and Julia for data analysis (2012)
2012 66 15 The Rise of the New Groupthink (2012)
2012 65 59 In which I answer all of the questions (2012)
2012 65 17 Meshing in a MinecraftGame (2012)
2012 64 69 R, the master troll of statistical languages (2012)
2012 61 30 Scientists find woman who sees 99 million more colors than others (2012)
2012 61 7 Megaupload Assisted U.S. Prosecution of Smaller File-Sharing Service (2012)
2012 60 79 A Personal Lisp Crisis (2012)
2012 59 73 Why I Quit Microsoft To Join A 5-Person Start Up In Toronto (2012)
2012 59 42 Don’t use bcrypt (2012)
2012 58 34 Higher social class predicts increased unethical behavior (2012) [pdf]
2012 57 126 US Federal Employee Salaries (2012)
2012 57 19 Understanding Quaternions (2012)
2012 57 11 SpaceX processing units, radiation-tolerant by design (2012)
2012 56 45 Illustrating the Ubuntu clown car, AccountsService edition (2012)
2012 56 21 New Programming Jargon (2012)
2012 55 71 Why I Went From Python To Go (and not Node.js) (2012)
2012 53 76 Monkey research suggests a biological explanation for toy preferences (2012)
2012 49 23 Reading Other People’s Code (2012)
2012 48 66 The Singularity is not coming (2012)
2012 47 38 Local State Is Poison (2012)
2012 47 28 Systems Programming at Twitter (2012)
2012 43 50 The Idea That Launched a Thousand Civilisations (2012) [pdf]
2012 43 23 What Killed Michael Porter’s Monitor Group? The Force That Really Matters (2012)
2012 43 9 Learn Anything Faster With The Feynman Technique (2012)
2012 41 7 Lesser known DNS tools and BIND tricks (2012)
2012 41 7 How I Would Do SEO for Rap Genius (2012)
2012 39 19 Big Data and the Topologist (2012)
2012 39 7 Russia’s Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals (2012)
2012 38 34 The trouble with Khan Academy (2012)
2012 38 23 Expect IBM to leave Vermont within three years (2012)
2012 37 21 Geode from iCache (2012)
2012 36 10 Facebook Tackles (Really) Big Data With Project Prism (2012)
2012 34 55 Why Not Use Port Knocking? (2012)
2012 34 40 So you want to do a PhD (2012)
2012 34 16 Why Im not on the Julia bandwagon (yet) (2012)
2012 33 20 Secure Your Domain Where Is Safe to Register a Domain Name? (2012)
2012 32 13 Officially, the Special Collection Service doesn’t exist (2012)
2012 32 6 StatusNet transforms into Node.js-driven pump.io (2012)
2012 31 7 Inside the Startup-Generating Secrets of Y Combinator (2012)
2012 24 50 Licensing Software Engineers Is in the Works (2012)
2012 24 46 Syntax Off (2012)
2012 23 3 Grokking V8 closures (2012)
2012 22 9 Why Selling WhatsApp To Facebook Would Be The Biggest Mistake (2012)
2012 20 21 Why Women-Only Transit Options Have Caught On (2012)
2012 18 15 Judge in hacker case is married to a Stratfor client (2012)
2012 17 33 How America is Dumbing Down the Next Generation (2012)
2012 17 26 Provably Fair Shuffling Through Cryptography (2012)
2012 17 1 Microsoft ignored tip that it botched browser choice in Windows 7 SP1 (2012)
2012 15 3 Transatlantic ping faster than sending a pixel to the screen? (2012)
2012 14 17 Has James Gates Discovered Computer Code in String Theory Equations? [2012]
2012 13 35 Florida mom gets 20 years for firing warning shots (2012)
2012 13 18 Tabulation Hashing andIndependence (2012)
2012 13 14 Why Stack Overflow Sucks (2012)
2012 13 1 Doorbell sends message to Cell Phone (2012)
2012 13 0 RoCE RDMA over Converged Ethernet (2012)
2012 12 0 A Backbone.Marionette tutorial [2012]
2012 10 3 Romney campaign got its IT from Best Buy, Staples, and friends (2012)
2012 7 15 Why arent there more women in tech? Ill tell you why Im not (2012)
2012 7 3 Random Hash Functions (2012)
2012 7 2 Choice quotes from Startup School [2012]
2012 7 0 Jerry’s Map (2012)
2012 6 0 The initial stack, reading process arguments and environment variables (2012)
2012 5 1 The Rise of the ‘Brogrammer’ (2012)
2012 5 0 Time’s quantum arrow has a preferred direction: confirm asymmetry (2012)
2012 4 3 Oh no, my flash card is gone (2012)
2012 4 1 A New Look At Einsteins Brain (2012)
2012 4 0 Beautiful vector Imperial propaganda (2012)
2012 2 1 Git: the NoSQL Database (2012)
2013 271 54 The user is drunk (2013) [video]
2013 266 59 Parsing English with 500 lines of Python (2013)
2013 265 230 The Ocean is Broken (2013)
2013 238 112 California police use of body cameras cuts violence and complaints (2013)
2013 217 115 The “Window Resizer” extension for Chrome now contains malware (2013)
2013 215 80 Why doesn’t GCC optimize aaaaaa to (aaa)(aaa)? (2013)
2013 182 54 GCHQ Used Fake LinkedIn Pages to Target Engineers (2013)
2013 173 126 I Knew a Programmer that Went Completely Insane (2013)
2013 155 86 Privacy Protects Bothersome People (2013)
2013 152 108 The Case for Formal Verification (2013)
2013 150 103 Why Use Make? (2013)
2013 146 158 Delphi why won’t it die? (2013)
2013 136 35 I challenged hackers to investigate me (2013)
2013 134 104 Fixing Windows 8 (2013)
2013 134 61 Python 3.3: Trust Me, It’s Better Than Python 2.7 (2013)
2013 127 77 We Arent the World (2013)
2013 118 202 Widespread sex differences in gene expression in the human brain (2013)
2013 111 60 Things I learned by pretending to be blind for a week (2013)
2013 86 8 Markov Networks, Monoids, and Futurama (2013)
2013 84 16 Eavesdropping on a wireless keyboard (2013)
2013 77 43 Polish clinics: Another kind of health tourism (2013)
2013 77 12 A new CPU (2013)
2013 72 75 The war against autocomplete=off (2013)
2013 72 20 The Story Behind Upcoming Film Spacesuit (2013)
2013 70 64 Whither print.css? A Rallying Cry for a Web Thats Fit to Print (2013)
2013 69 46 The Programming Steamroller Waits For No One (2013)
2013 69 35 JavaScript has a Unicode problem (2013)
2013 67 57 The reality show: Schizophrenics used to see demons and spirits (2013)
2013 65 51 Your Game Doesn’t Need UDP Yet (2013)
2013 60 12 Jepsen: Testing Partition Tolerance of PostgreSQL, Redis, MongoDB, Riak (2013)
2013 56 72 What if we never run out of oil? (2013)
2013 55 3 Elasticsearch as a NoSQL Database (2013)
2013 50 22 Android 4.3 Factory images for Nexus 7 (2013) Available
2013 49 18 XEP-0280: Message Carbons (2013)
2013 48 77 Please Don’t Learn Category Theory (2013)
2013 40 28 Launching the Quantum Artificial Intelligence Lab (2013)
2013 40 2 CoreOS and Docker: first steps (2013)
2013 38 26 Pandoc Markdown and ReST Compared (2013)
2013 34 8 The Sound of Sorting “Audibilization” and Visualization of Algorithms (2013)
2013 32 14 Good and Bad Technical Debt (and how TDD helps) (2013)
2013 31 46 How CMU Increased the Proportion of Women in Computer Science (2013)
2013 29 39 The Difference Between Programmers and Coders (2013)
2013 29 21 How SSD power faults scramble your data (2013)
2013 29 19 What Comes After Antibiotics? Alternatives to Stop Superbugs (2013)
2013 29 2 When New Yorkers Lived Knee-Deep In Trash (2013)
2013 27 67 Best Linux Laptops (2013)
2013 24 33 CES: Worse Products Through Software (2013)
2013 24 18 John Carmack: Linux is not the right platform for video games (2013)
2013 23 31 TrueCrypt’s Plausible Deniability is Theoretically Useless [2013]
2013 22 20 Designing a safer intersection with geometry (2013)
2013 21 13 The Eight Hour Burn (2013)
2013 18 13 Harvard Study Confirms Fluoride Reduces Children’s IQ (2013)
2013 14 2 Got any tips or tricks for Terminal in Mac OS X? (2013)
2013 9 2 Streaming Similarity Search over one Billion Tweets (2013) [pdf]
2013 7 2 Analysis of the Botany, Zoology, and Mineralogy of the Voynich Manuscript (2013)
2013 7 0 Surviving legacycode (2013)
2013 6 1 Lies, Damned Lies, and the Telegraph (2013)
2014 344 389 Your best passive income? (2014)
2014 68 35 The fallen heroes of virtual reality (2014)