The best Hacker News stories from Show from the past day
Latest posts:
Show HN: I cloned HN to make a simple portfolio page
I figured, "what better way to look at a list of (hopefully) inspiring projects?"<p>The upvotes work and are globally synced.
Show HN: I cloned HN to make a simple portfolio page
I figured, "what better way to look at a list of (hopefully) inspiring projects?"<p>The upvotes work and are globally synced.
Show HN: I cloned HN to make a simple portfolio page
I figured, "what better way to look at a list of (hopefully) inspiring projects?"<p>The upvotes work and are globally synced.
Show HN: Anyma V, a hybrid physical modelling virtual instrument
Hi HN! We're a small team in Lille (France) who make synthesizers and MIDI controllers. We've just released a virtual plugin version of our hardware synth Anyma Phi, which offers a semi-modular environment with a focus on physical models, although there are several other kinds of synthesis.<p>Here's a video: <a href="https://www.youtube.com/watch?v=6efDQ9GmRpg" rel="nofollow">https://www.youtube.com/watch?v=6efDQ9GmRpg</a><p>We're not pivoting to VSTs, it's just that it was a practical way of investigating several issues and helping us with the ongoing development of our upcoming Kickstarter-backed synth (Anyma Omega) and MPE controller (Loom), and a gift to thank our backers for the wait they gave to go through due to several manufacturing and production issues.<p>I enjoy reading music-related entries here, so I thought I'd contribute this time and I hope it will interest some. I'm here for any question or remark.
Show HN: Anyma V, a hybrid physical modelling virtual instrument
Hi HN! We're a small team in Lille (France) who make synthesizers and MIDI controllers. We've just released a virtual plugin version of our hardware synth Anyma Phi, which offers a semi-modular environment with a focus on physical models, although there are several other kinds of synthesis.<p>Here's a video: <a href="https://www.youtube.com/watch?v=6efDQ9GmRpg" rel="nofollow">https://www.youtube.com/watch?v=6efDQ9GmRpg</a><p>We're not pivoting to VSTs, it's just that it was a practical way of investigating several issues and helping us with the ongoing development of our upcoming Kickstarter-backed synth (Anyma Omega) and MPE controller (Loom), and a gift to thank our backers for the wait they gave to go through due to several manufacturing and production issues.<p>I enjoy reading music-related entries here, so I thought I'd contribute this time and I hope it will interest some. I'm here for any question or remark.
Show HN: Anyma V, a hybrid physical modelling virtual instrument
Hi HN! We're a small team in Lille (France) who make synthesizers and MIDI controllers. We've just released a virtual plugin version of our hardware synth Anyma Phi, which offers a semi-modular environment with a focus on physical models, although there are several other kinds of synthesis.<p>Here's a video: <a href="https://www.youtube.com/watch?v=6efDQ9GmRpg" rel="nofollow">https://www.youtube.com/watch?v=6efDQ9GmRpg</a><p>We're not pivoting to VSTs, it's just that it was a practical way of investigating several issues and helping us with the ongoing development of our upcoming Kickstarter-backed synth (Anyma Omega) and MPE controller (Loom), and a gift to thank our backers for the wait they gave to go through due to several manufacturing and production issues.<p>I enjoy reading music-related entries here, so I thought I'd contribute this time and I hope it will interest some. I'm here for any question or remark.
Show HN: Anyma V, a hybrid physical modelling virtual instrument
Hi HN! We're a small team in Lille (France) who make synthesizers and MIDI controllers. We've just released a virtual plugin version of our hardware synth Anyma Phi, which offers a semi-modular environment with a focus on physical models, although there are several other kinds of synthesis.<p>Here's a video: <a href="https://www.youtube.com/watch?v=6efDQ9GmRpg" rel="nofollow">https://www.youtube.com/watch?v=6efDQ9GmRpg</a><p>We're not pivoting to VSTs, it's just that it was a practical way of investigating several issues and helping us with the ongoing development of our upcoming Kickstarter-backed synth (Anyma Omega) and MPE controller (Loom), and a gift to thank our backers for the wait they gave to go through due to several manufacturing and production issues.<p>I enjoy reading music-related entries here, so I thought I'd contribute this time and I hope it will interest some. I'm here for any question or remark.
Show HN: I am using AI to measure how well cats sit like bread
Show HN: I am using AI to measure how well cats sit like bread
Show HN: Non SaaS – Directory of Non SaaS Apps
Show HN: Dashboards as Code – We make dashboards more programmable
As engineers building a BI tool, we thought, why not treat analytics like software development?<p>We believe dashboards should be as-code because this allows you to:<p>* Treat dashboards as programmable objects and build reusable components/functions.<p>* Dynamically generate charts or dashboards.<p>* Version control every dashboard in a Git repository.<p>* Automate and integrate your dashboards with your workflow.<p>So, we built one! It’s still a work in progress, but you can tinker with it here: https://playground.holistics.io/play<p>Feedback is very welcome and appreciated.
Show HN: An interactive creative coding project in p5.js
(space = reset) Fluid mechanics is an extremely interesting topic and I have been creative coding for a couple of months now. Therefore I started working on flow fields in processing. It had so much fun playing around with the different parameters in this project, I decided to rewrite in p5.js an added a control panel. You can change most of the parameters (within some constraints I thought to be reasonable), randomize the values and export and import settings. Hopefully some coders here get inspired and also join the great creative coding community.
Show HN: Shadow IT Scan – Uncover SaaS Apps, Users and Risky OAuth Scopes
Hey HN,<p>TL;DR: We’ve launched a free version of our Shadow IT scanner to identify which SaaS apps are used in your company, who uses them, and if they have high-risk OAuth scopes.<p>Philip and I went through YC with AccessOwl in 2022. We started the company because, in our previous roles, we struggled to track all the SaaS apps, users, and granted OAuth scopes.
The Shadow IT scanner started as a small feature within AccessOwl, which manages SaaS vendors and user accounts centrally. But a standalone scanner would have made our lives so much easier in our previous roles. So, we thought, why not release it?<p>And here it is: a free, standalone Shadow IT scanner!<p>Hope you find it useful :) The Shadow IT scan helps with:<p>1. Offboarding: Employees often don’t report all the apps they sign up for, making it tough to track and secure these accounts when they leave, especially with the common SSO tax.<p>2. Security: OAuth scopes are quickly granted but rarely reviewed or removed, leading to organizations unknowingly spreading their data.<p>3. Compliance: Auditors need a list of SaaS vendors, which is hard to compile when employees sign up for tools independently.<p>Any surprises in your scan? What features would you like to see in the next version?
Looking forward to your feedback!<p>FAQ<p>What’s Shadow IT?
Unauthorized SaaS apps within an organization not centrally managed, posing security and compliance risks.<p>How does it work?
Our tool connects to your Google Workspace or M365 instance, identifies OAuth tokens granted, and maps them to known SaaS tools. Note: In this v1 version, it only detects apps using the “Sign in with Google/Microsoft” button.<p>Who is this for?
Typically IT and InfoSec teams, but in smaller companies, it may fall under the CTO.<p>Is it safe to use?
Yes, reading OAuth tokens is standard for SaaS management tools. Data extraction only occurs when you initiate a scan. AccessOwl is SOC 2 Type II audited and GDPR compliant.
Show HN: Shadow IT Scan – Uncover SaaS Apps, Users and Risky OAuth Scopes
Hey HN,<p>TL;DR: We’ve launched a free version of our Shadow IT scanner to identify which SaaS apps are used in your company, who uses them, and if they have high-risk OAuth scopes.<p>Philip and I went through YC with AccessOwl in 2022. We started the company because, in our previous roles, we struggled to track all the SaaS apps, users, and granted OAuth scopes.
The Shadow IT scanner started as a small feature within AccessOwl, which manages SaaS vendors and user accounts centrally. But a standalone scanner would have made our lives so much easier in our previous roles. So, we thought, why not release it?<p>And here it is: a free, standalone Shadow IT scanner!<p>Hope you find it useful :) The Shadow IT scan helps with:<p>1. Offboarding: Employees often don’t report all the apps they sign up for, making it tough to track and secure these accounts when they leave, especially with the common SSO tax.<p>2. Security: OAuth scopes are quickly granted but rarely reviewed or removed, leading to organizations unknowingly spreading their data.<p>3. Compliance: Auditors need a list of SaaS vendors, which is hard to compile when employees sign up for tools independently.<p>Any surprises in your scan? What features would you like to see in the next version?
Looking forward to your feedback!<p>FAQ<p>What’s Shadow IT?
Unauthorized SaaS apps within an organization not centrally managed, posing security and compliance risks.<p>How does it work?
Our tool connects to your Google Workspace or M365 instance, identifies OAuth tokens granted, and maps them to known SaaS tools. Note: In this v1 version, it only detects apps using the “Sign in with Google/Microsoft” button.<p>Who is this for?
Typically IT and InfoSec teams, but in smaller companies, it may fall under the CTO.<p>Is it safe to use?
Yes, reading OAuth tokens is standard for SaaS management tools. Data extraction only occurs when you initiate a scan. AccessOwl is SOC 2 Type II audited and GDPR compliant.
Show HN: Shadow IT Scan – Uncover SaaS Apps, Users and Risky OAuth Scopes
Hey HN,<p>TL;DR: We’ve launched a free version of our Shadow IT scanner to identify which SaaS apps are used in your company, who uses them, and if they have high-risk OAuth scopes.<p>Philip and I went through YC with AccessOwl in 2022. We started the company because, in our previous roles, we struggled to track all the SaaS apps, users, and granted OAuth scopes.
The Shadow IT scanner started as a small feature within AccessOwl, which manages SaaS vendors and user accounts centrally. But a standalone scanner would have made our lives so much easier in our previous roles. So, we thought, why not release it?<p>And here it is: a free, standalone Shadow IT scanner!<p>Hope you find it useful :) The Shadow IT scan helps with:<p>1. Offboarding: Employees often don’t report all the apps they sign up for, making it tough to track and secure these accounts when they leave, especially with the common SSO tax.<p>2. Security: OAuth scopes are quickly granted but rarely reviewed or removed, leading to organizations unknowingly spreading their data.<p>3. Compliance: Auditors need a list of SaaS vendors, which is hard to compile when employees sign up for tools independently.<p>Any surprises in your scan? What features would you like to see in the next version?
Looking forward to your feedback!<p>FAQ<p>What’s Shadow IT?
Unauthorized SaaS apps within an organization not centrally managed, posing security and compliance risks.<p>How does it work?
Our tool connects to your Google Workspace or M365 instance, identifies OAuth tokens granted, and maps them to known SaaS tools. Note: In this v1 version, it only detects apps using the “Sign in with Google/Microsoft” button.<p>Who is this for?
Typically IT and InfoSec teams, but in smaller companies, it may fall under the CTO.<p>Is it safe to use?
Yes, reading OAuth tokens is standard for SaaS management tools. Data extraction only occurs when you initiate a scan. AccessOwl is SOC 2 Type II audited and GDPR compliant.
Show HN: Shadow IT Scan – Uncover SaaS Apps, Users and Risky OAuth Scopes
Hey HN,<p>TL;DR: We’ve launched a free version of our Shadow IT scanner to identify which SaaS apps are used in your company, who uses them, and if they have high-risk OAuth scopes.<p>Philip and I went through YC with AccessOwl in 2022. We started the company because, in our previous roles, we struggled to track all the SaaS apps, users, and granted OAuth scopes.
The Shadow IT scanner started as a small feature within AccessOwl, which manages SaaS vendors and user accounts centrally. But a standalone scanner would have made our lives so much easier in our previous roles. So, we thought, why not release it?<p>And here it is: a free, standalone Shadow IT scanner!<p>Hope you find it useful :) The Shadow IT scan helps with:<p>1. Offboarding: Employees often don’t report all the apps they sign up for, making it tough to track and secure these accounts when they leave, especially with the common SSO tax.<p>2. Security: OAuth scopes are quickly granted but rarely reviewed or removed, leading to organizations unknowingly spreading their data.<p>3. Compliance: Auditors need a list of SaaS vendors, which is hard to compile when employees sign up for tools independently.<p>Any surprises in your scan? What features would you like to see in the next version?
Looking forward to your feedback!<p>FAQ<p>What’s Shadow IT?
Unauthorized SaaS apps within an organization not centrally managed, posing security and compliance risks.<p>How does it work?
Our tool connects to your Google Workspace or M365 instance, identifies OAuth tokens granted, and maps them to known SaaS tools. Note: In this v1 version, it only detects apps using the “Sign in with Google/Microsoft” button.<p>Who is this for?
Typically IT and InfoSec teams, but in smaller companies, it may fall under the CTO.<p>Is it safe to use?
Yes, reading OAuth tokens is standard for SaaS management tools. Data extraction only occurs when you initiate a scan. AccessOwl is SOC 2 Type II audited and GDPR compliant.
Show HN: Burrow is a globally distributed, serverless HTTP proxy
Show HN: Trayce – Network tab for Docker containers
Trayce (<a href="https://github.com/evanrolfe/trayce_gui">https://github.com/evanrolfe/trayce_gui</a>) is an open source desktop application which monitors HTTP(S) traffic to Docker containers on your machine. It uses EBPF to achieve zero-configuration sniffing of TLS-encrypted traffic.<p>As a backend developer I wanted something which was similar to Wireshark or the Chrome network tab, but which intercepted requests & responses to my containers for debugging in a local dev environment. Wireshark is a great tool but it seems more geared towards lower level networking tasks. When I'm developing APIs or microservices I dont care about packets, I'm only concerned with HTTP requests and their responses. I also didn't want to have to configure a pre-shared master key to intercept TLS, I wanted it to work out-of-the-box.<p>Trayce is in beta phase so feedback is very welcome, bug reports too. The frontend GUI is written in Python with the QT framework. The TrayceAgent which is what does the intercepting of traffic is written in Go and EBPF.
Show HN: Trayce – Network tab for Docker containers
Trayce (<a href="https://github.com/evanrolfe/trayce_gui">https://github.com/evanrolfe/trayce_gui</a>) is an open source desktop application which monitors HTTP(S) traffic to Docker containers on your machine. It uses EBPF to achieve zero-configuration sniffing of TLS-encrypted traffic.<p>As a backend developer I wanted something which was similar to Wireshark or the Chrome network tab, but which intercepted requests & responses to my containers for debugging in a local dev environment. Wireshark is a great tool but it seems more geared towards lower level networking tasks. When I'm developing APIs or microservices I dont care about packets, I'm only concerned with HTTP requests and their responses. I also didn't want to have to configure a pre-shared master key to intercept TLS, I wanted it to work out-of-the-box.<p>Trayce is in beta phase so feedback is very welcome, bug reports too. The frontend GUI is written in Python with the QT framework. The TrayceAgent which is what does the intercepting of traffic is written in Go and EBPF.
Show HN: Trayce – Network tab for Docker containers
Trayce (<a href="https://github.com/evanrolfe/trayce_gui">https://github.com/evanrolfe/trayce_gui</a>) is an open source desktop application which monitors HTTP(S) traffic to Docker containers on your machine. It uses EBPF to achieve zero-configuration sniffing of TLS-encrypted traffic.<p>As a backend developer I wanted something which was similar to Wireshark or the Chrome network tab, but which intercepted requests & responses to my containers for debugging in a local dev environment. Wireshark is a great tool but it seems more geared towards lower level networking tasks. When I'm developing APIs or microservices I dont care about packets, I'm only concerned with HTTP requests and their responses. I also didn't want to have to configure a pre-shared master key to intercept TLS, I wanted it to work out-of-the-box.<p>Trayce is in beta phase so feedback is very welcome, bug reports too. The frontend GUI is written in Python with the QT framework. The TrayceAgent which is what does the intercepting of traffic is written in Go and EBPF.