May 2013 Archive
11941.
Analytics at Spotify (labs.spotify.com)
11942.
Linda Stone on Maintaining Focus in a Maddeningly Distractive World (theatlantic.com)
11943.
Ask HN: Is HN moving to CloudFlare? ()
11944.
PSA: Xbox Live was not hacked today (venturebeat.com)
11945.
Pair Programming with tmux (travisstaton.com)
11946.
Class of 2013: You Can’t Make a Living Just by Solving Problems (linkedin.com)
11947.
Startups & Entrepreneurs: Underdogs that you love to cheer for (rudebaguette.com)
11948.
Submittable(YC S12) releases Facebook Events Integration (blog.submittable.com)
11949.
Retro Game Music Bundle (gamemusicbundle.com)
11950.
Why bitcoins still matter - thoughts? #techmap (blog.thetechmap.com)
11951.
Google’s Hunger For Structured Markup (searchengineland.com)
11952.
The Retro Game Music Bundle Makes History (blog.gamemusicbundle.com)
11953.
A Startup’s Guide to Maximizing Last Mover Advantage (tomtunguz.com)
11954.
Appy decisions: why HTML5 could be the option you’re looking for (fourthsource.com)
11955.
Attention large Linux workloads (theregister.co.uk)
11956.
The third prong of AMD’s new mobile assault: Lower power Richland APUs (extremetech.com)
11957.
IQ Measurable Just By A Visual Test (rochester.edu)
11958.
Semantic Versioning Specification (semver.org)
11959.
Mobile HTML: The Future of Your Sites - Google I/O (youtube.com)
11960.
The Power of 'I Don't Know' (opinionator.blogs.nytimes.com)
11961.
Much of “startup” is denial (michaelochurch.wordpress.com)
11962.
Software dev ()
11963.
Judge Thinks "It's Likely" that Apple Illegally Fixed E-Book Prices (theregister.co.uk)
11964.
The Mathematician Who Could Be a Movie Star (bloomberg.com)
11965.
The New Google Maps - Better than you might think ... (geekswithblogs.net)
11966.
Mr. Money Mustache answers early-retirement doubters (washingtonpost.com)
11967.
Using Flickr as Network Storage with FUSE (github.com)
11968.
A futurist looks at the future of marketing (blogs.hbr.org)
11969.
Why Are Tornadoes So Hard To Predict? (popsci.com)
11970.
Computer Fraud and Abuse Act used to threaten journalists (infosecurity-magazine.com)