2011 Archive
1861.
Done, that was easy. Keep your money, we do it for the lulz (blackbergsecurity.us)
1862.
The Clock in the Mountain (kk.org)
1863.
Pixar's Library (graphics.pixar.com)
1864.
How to Sell your Company (jacquesmattheij.com)
1865.
Apple's iCloud will automatically store, sync data for free (appleinsider.com)
1866.
Poll: Do you know C?
1867.
The single most useful Emacs feature (stackoverflow.com)
1868.
Clayton Christensen: How MBA-driven Profit focus is Killing the U.S. Economy (forbes.com)
1869.
Show HN: "Never wait on hold again" service built with Rails and Twilio
1870.
EFF: forced disclosure of encryption password violates 5th Amendment (eff.org)
1871.
Rich Hickey stops Clojure funding appeal from 2011 onwards (clojure.org)
1872.
Bug Prediction at Google (google-engtools.blogspot.com)
1873.
Is Scheme Faster than C? (cs.indiana.edu)
1874.
Skype's Crazy Regex Easter Egg (blog.nyaruka.com)
1875.
EU Court of Justice: Censorship in Name of Copyright Violates Fundamental Rights (laquadrature.net)
1876.
Chain World: a game that exists on a unique USB flash drive (wired.com)
1877.
Pictures of the first GUIs from Xerox (digibarn.com)
1878.
Einstein for Everyone (pitt.edu)
1879.
For Google, iCloud Is Annoying; For Microsoft, It's A Humiliation (sfgate.com)
1880.
Michael Arrington: Editorial Independence (techcrunch.com)
1881.
FBI: Carrier IQ files used for "law enforcement purposes" (muckrock.com)
1882.
MongoDB 2.0 Released (blog.mongodb.org)
1883.
Can you build beautiful sites with Twitter Bootstrap? Hell yes (builtwithbootstrap.tumblr.com)
1884.
Brutal New York - 1965/95 (skyscrapercity.com)
1885.
Save IE6 (saveie6.com)
1886.
Federal Circuit case renders many broadly written software patents invalid (patentlyo.com)
1887.
Show HN: a free multi-user whiteboard with unlimited, zoomable surface (sketchub.com)
1888.
Massive networks of stripes appear in Chinese Desert--visible from space (slashgear.com)
1889.
Sam Altman will clean your house for $5 (blog.agrawals.org)
1890.
A little game to demonstrate timing attacks. (carlos.bueno.org)