Cybersecurity Visuals Challenge
(openideo.com)
August 2019 Archive
1561.
1562.
Arcs of Seniority
(stevanpopovic.com)
1563.
Mailpile: Email that protects your privacy
(mailpile.is)
1564.
In praise of xlogo
(simont.dreamwidth.org)
1565.
Lisp as a Vehicle for Rapid Prototyping (1997)
(nhplace.com)
1566.
China’s Soft-Power Fail: Condemning Hong Kong’s Protests
(nytimes.com)
1568.
Libgphoto2 Controls Digital Cameras
(gphoto.org)
1569.
C preprocessor tricks, tips, and idioms (2015)
(github.com)
1572.
The Surprising Number of Programmers Who Can’t Program
(letterstoanewdeveloper.com)
1573.
A Look at HS2's Old Oak Common Station
(ianvisits.co.uk)
1574.
During the Renaissance, the beard was the defining feature of a man
(historytoday.com)
1575.
A scientist must go where the evidence leads
(blogs.scientificamerican.com)
1577.
Smartphone Sales Are in Freefall, and That’s Okay
(ifixit.com)
1579.
The Past, Present and Future of Competitive Magic The Gathering
(channelfireball.com)
1580.
Leaked Draft of Trump Executive Order to 'Censor the Internet' Denounced
(commondreams.org)
1581.
1582.
Mining Bitcoin on an Apple II
(twitch.tv)
1583.
Our team's troubles writing automated UI tests
(medium.com)
1584.
The Long Game of Research
(cacm.acm.org)
1585.
Solitude and Leadership (2010)
(theamericanscholar.org)
1586.
Cryptographic key used to sign one of Facebook's Android apps compromised
(androidpolice.com)
1587.
How Judy arrays work and why they are so fast (2002)
(judy.sourceforge.net)
1588.
A New Clue to How Life Originated
(theatlantic.com)
1589.
The New American Homeless
(newrepublic.com)
1590.
It's Gotten Too Hard to Strike It Rich in America
(bloomberg.com)