December 2014 Archive
13741.
Why Facebook shouldn’t apologise for its Year in Review (theguardian.com)
13742.
New Eruption at Hunga Tonga-Hunga Ha’apai (wired.com)
13743.
Status of Debian Jessie (December 2014) (nthykier.wordpress.com)
13744.
iOS and OS X Timeline: history, graphs and statistics (vladalexa.com)
13745.
Getting Started with Docker (bman.io)
13746.
7 European Tech Moments of 2014 (techcrunch.com)
13747.
How We Do Mobile Engineering at Venmo (chris.cm)
13748.
Article: Our brains are being 'continuously reshaped' by smartphone use ()
13749.
How to Hack Hacker News and Get Thousands of Views (tech.co)
13750.
2014 – Side Projects (thomasdav.is)
13751.
Self-sacrifice as hacker-culture glue (esr.ibiblio.org)
13752.
BRICKS is a list for all the domains blocked by the Chinese GFW (github.com)
13753.
Day 9: First Unity Game (nicolewoo.ca)
13754.
Tor: 80 percent of?? percent of 1-2 percent abusive (blog.torproject.org)
13755.
Netflix to Help Parents Trick Kids with Fake New Year's Eve Countdown (rollingstone.com)
13756.
What's Next in Wireless: John Legeres 2015 Predictions (newsroom.t-mobile.com)
13757.
2014 in review Google Doodle (google.com)
13758.
Mac 2014 – I go into full Windows XP mode (tech.kateva.org)
13759.
How we built an iPad app in 2 weeks (medium.com)
13760.
Axoloti – Embeddable DSP Modular Synth Based on the STM32F4 with Graphical ()
13761.
The 2015 Fintech Headline “RIP Bitcoin and XBRL, Incumbency Wins” (bernardlunn.com)
13762.
Any chicago companies looking for interns this summer? ()
13763.
Benchmarking JSON and HMAC in Python (techusearch.com)
13764.
Docker managed lifecycle example: using whaleware to run WombatDialer (github.com)
13765.
What's it like having a Startup for those who haven't experienced it (masterhousemedia.com)
13766.
CMS2CMS.COM Automated CMS and Forum Migration Service (cms2cms.com)
13767.
What Happens If Tor Directory Authorities Are Seized? (jordan-wright.github.io)
13768.
Photojournalist arrested after filming with drone near Gatwick airport (theguardian.com)
13769.
Some thoughts on Hidden Services (blog.torproject.org)
13770.
How NSA targeted chancellor Merkel's mobile phone (electrospaces.blogspot.com)