Tracking the flow of ideas through the programming languages literature
(tmpl.weaselhat.com)
August 2015 Archive
3571.
3572.
3573.
3574.
Gradberry Class Today: Learn How to Hire Top Talent
(courses.platzi.com)
3575.
Applying a Logic Analyzer to the Surface Touch Cover
(edwardsh.in)
3576.
3577.
3578.
On Safenet HSM key-extraction vulnerability CVE-2015-5464 (part I)
(randomoracle.wordpress.com)
3579.
Keysort: The Schwartzian Transform in Go
(danverbraganza.com)
3580.
TNFoN 2: Developer Friendly Notifications
(blog.latis.io)
3581.
3582.
Remove the middle-man between your code and your deployment
(blog.bitbucket.org)
3583.
Best Research Paper Award: “Algorithms for Public-Private Social Networks”
(googleresearch.blogspot.com)
3584.
Content Volatility of Scientific Topics in Wikipedia: A Cautionary Tale
(journals.plos.org)
3585.
Shift – The Dwolla debit card
(shiftpayments.com)
3586.
Convox 0.5: Multi-Region VPCs, Process Scaling, and Databases
(blog.convox.com)
3587.
Relay and Routing
(medium.com)
3588.
Microsoft will explain only 'significant' Windows 10 updates
(theregister.co.uk)
3589.
A simple implementation of the SECD abstract machine
(github.com)
3590.
3591.
John McAfee: Ashley Madison “Was an Inside Job”
(gizmodo.com)
3592.
Startup Wants Better IoT Radios
(eetimes.com)
3593.
3594.
Apple Music Exec Is Out
(recode.net)
3595.
Lightbeam – Shine a Light on Who’s Watching You
(mozilla.org)
3596.
Ashley Madison – A final analysis of the data
(blog.binaryedge.io)
3597.
KeyRaider Jailbroken iOS Malware Steals Over 225,000 Apple Accounts
(researchcenter.paloaltonetworks.com)