For the best experience on desktop, install the Chrome extension to track your reading on news.ycombinator.com
Hacker Newsnew | past | comments | ask | show | jobs | submit | history | auza's submissionsregister
1.User Centered Design (medium.com/asl19-design)
1 point by auza on Aug 8, 2019 | past
2.Multiple Gitlab Projects on the Same Kubernetes Cluster (Gitlab CI/CD) (reddit.com)
1 point by auza on Aug 2, 2019 | past
3.Create ReadWriteMany PersistentVolumeClaims on Your Kubernetes Cluster (medium.com/asl19-developers)
2 points by auza on July 31, 2019 | past
4.Use Let’s Encrypt and Cert-Manager to Publish Your Kubernetes Apps (medium.com/asl19-developers)
1 point by auza on July 29, 2019 | past
5.Practices for Organizing Staging-Level Kubernetes Applications with Namespaces (medium.com/asl19-developers)
1 point by auza on July 25, 2019 | past
6.Build your own cloud-agnostic TCP/UDP LoadBalancer for your Kubernetes apps (medium.com/asl19-developers)
2 points by auza on July 23, 2019 | past
7.Hosting Outline VPN Server on Kubernetes (medium.com/asl19-developers)
1 point by auza on July 23, 2019 | past
8.California Consumer Privacy Act of 2018 (washingtonpost.com)
12 points by auza on June 28, 2018 | past
9.Eelo, an open source mobile phone OS (eelo.io)
1 point by auza on June 18, 2018 | past
10.How a Turkish political party used Google AdWords to defy censorship (dailydot.com)
2 points by auza on June 11, 2018 | past
11.Hi, I Am AI and Blockchain-Powered SummarizeBot (summarizebot.com)
5 points by auza on June 10, 2018 | past | 2 comments
12.Google again releases Windows zero-day vulnerability details (bit-tech.net)
3 points by auza on Feb 21, 2017 | past
13.Gmail Account Hijacking Vulnerability (securityfuse.com)
66 points by auza on Nov 6, 2016 | past | 23 comments
14.Signing into one billion mobile app accounts effortlessly with oauth2.0 [pdf] (blackhat.com)
2 points by auza on Nov 6, 2016 | past
15.How We Want to Turn Asteroids into Spacecraft (medium.com/made-in-space)
1 point by auza on June 7, 2016 | past
16.Angler exploit kit evades EMET (fireeye.com)
1 point by auza on June 7, 2016 | past
17.A 'Big Red Button' for AI to interrupt its harmful sequence of action [pdf] (intelligence.org)
3 points by auza on June 6, 2016 | past | 3 comments
18.Tattoo Recognition Research Threatens Free Speech and Privacy (eff.org)
5 points by auza on June 3, 2016 | past
19.Welcome to Magenta (tensorflow.org)
2 points by auza on June 2, 2016 | past
20.Ransomware-hit hospital faces second demand despite paying up (sophos.com)
1 point by auza on June 1, 2016 | past
21.SilentKeys: A Keyboard That Protects Your Privacy and Security (kickstarter.com)
3 points by auza on May 31, 2016 | past | 2 comments
22.Real World “Pong” Table [video] (youtube.com)
2 points by auza on May 31, 2016 | past
23.Neanderthals built cave structures – and no one knows why (nature.com)
5 points by auza on May 26, 2016 | past | 2 comments
24.Session with Peter Norvig (quora.com)
2 points by auza on May 24, 2016 | past
25.Meet Amazon President Jeff Bezos (washingtonpost.com)
4 points by auza on May 20, 2016 | past
26.A Sexbot Hacked the Late David Carr's Twitter (adweek.com)
2 points by auza on May 20, 2016 | past
27.It's time to reopen fight club (theverge.com)
1 point by auza on May 18, 2016 | past
28.Mars orbit laboratory to be launched in 2018 (popsci.com)
2 points by auza on May 18, 2016 | past
29.Mozilla Open Source Support (wiki.mozilla.org)
2 points by auza on May 17, 2016 | past
30.Google launches Spaces group-sharing app on Android, iOS, and desktop (venturebeat.com)
1 point by auza on May 17, 2016 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search:

HN For You