January 2008 Archive
1951.
700 MHz Auction Tracking (wireless.fcc.gov)
1952.
Popular CSS Techniques (noupe.com)
1953.
You Could Help Find and Track "Dirty Bombs" by Simply Carrying a Cell Phone With GPS (advice.cio.com)
1954.
Cramming for DEMO, "A Test of Nerves" (foundread.com)
1955.
Truecrypt for OS X released (includes generic encryption layer) (osxcrypt.org)
1956.
Lumify - enlighten your research (lumifi.com)
1957.
1000 Genomes Project To Accelerate Genetic Discoveries (futurepundit.com)
1958.
Free Remote Control Software (on Weekends) (joelonsoftware.com)
1959.
Hackers Post YouTube Video Declaring War on Scientology (breitbart.tv)
1960.
Some People Never Learn - genetic factor affects our ability to learn from our errors (tfot.info)
1961.
"The MBA is pretty hard...challenging-the-way-you-view-business hard" (businessweek.com)
1962.
24 Ways to Achieve a Deep, Uninterrupted Sleep (rd.com)
1963.
Can Photo Clues Lead to Digital Camera's Owner (physorg.com)
1964.
Run 37 Signals' Basecamp Offline with AIR (riapedia.com)
1965.
What is a Ruby symbol and why are they important? (rubytips.org)
1966.
JavaScript Client Library for Facebook API (developers.facebook.com)
1967.
Light Bulbs, Cell Phones and Utility (howtosplitanatom.com)
1968.
Neat Javascript hack at reddit (with explanation of how they did it) (reddit.com)
1969.
From the makers of mochikit - MochiAds: the largest ad network for flash games (mochiads.com)
1970.
Military Robots Gain Advanced Sight (networkworld.com)
1971.
Amazon MP3 Store to Go Global this year (phx.corporate-ir.net)
1972.
Less known web application framework: Divmod Nevow (divmod.org)
1973.
Biohazard Symbol History (hms.harvard.edu)
1974.
YU0 suck at Photoshop, man (mydamnchannel.com)
1975.
Workspace+Exercise Hack: The Treadmill Desk (rura.org)
1976.
What happens if physicists gain control of computer languages (globalpioneering.com)
1977.
Perl Cannot Be Parsed: A Formal Proof (perlmonks.org)
1978.
Ultra-immersive, long-form video games from the past or future (paulbuchheit.blogspot.com)
1979.
Near-Revolt on Digg Underscores Site's Dependence on Its Users (wired.com)
1980.
Two security researchers infiltrate the phishing underground and reveal how you info is traded (net-security.org)