August 2015 Archive
11311.
The Decline of Malnutrition: How the World Eats Now
(daily.jstor.org)
11312.
Researchers Discover Possible Obesity Gene
(sci-news.com)
11313.
Kalman and Bayesian filters in iPython Notebook
(nbviewer.ipython.org)
11314.
The Dark Side of NPM
(blog.rollout.io)
11315.
Hacker Paradise Goes to Japan
(hackerparadise.org)
11316.
Pound load balancing concepts (basic)
(technicaldirector.ltd.uk)
11317.
Official GraphQL Relay server
(github.com)
11318.
How Life and Luck Changed Earth’s Minerals
(quantamagazine.org)
11319.
Why Indian Managers Are Succeeding in Tech’s C-Suite
(blogs.wsj.com)
11320.
When Prostitution Is Nobody's Business
(opinionator.blogs.nytimes.com)
11321.
Why Rust? From a Rubyist point of view
(developingjourney.netlify.com)
11322.
Growth Hacking has 2 phases – and using the wrong one will sink you
(venturebeat.com)
11323.
How widely used are security based HTTP response headers?
(scotthelme.co.uk)
11324.
11325.
Google creates Alphabet but runs into BMW
(nytimes.com)
11326.
GitHub Issue Etiquette (2013)
(defmacro.org)
11327.
11328.
How Hackers Made $1M by Stealing One News Release
(nytimes.com)
11329.
ASP.NET Self Host Static File Server
(codeopinion.com)
11330.
How to Install and Use Command Line Cheat Sheets on Ubuntu 14.04
(digitalocean.com)
11331.
Monads explained (sort of) to a C# developer
(gist.github.com)
11332.
11333.
The Death Cross Forms on the Dow Chart
(bloomberg.com)
11334.
2000 miles with Apple Maps
(sixcolors.com)
11335.
Tour of 1985 Home Automation System with Touchscreen
(youtube.com)
11336.
What Was This Texas Congressman Doing at the Hacking Conference Def Con?
(motherboard.vice.com)
11337.
Take control of your social media content schedule
(appkosh.com)
11338.
Ember 2.0 tutorial with authentication
(auth0.com)
11339.
High-performance browser networking and optimizing application delivery
(chimera.labs.oreilly.com)
11340.
Cold War Simulation and Canvas – The Talk
(vimeo.com)