Even Boring Form Data Can Be Interesting (For A Developer)
(architects.dzone.com)
September 2012 Archive
16951.
16952.
16953.
Dangerous, dangerous ideas
(scoopinion.com)
16954.
3 Ways to Handle Dependencies
(blog.assembla.com)
16955.
16956.
16957.
New ActiveMQ Failover and Clustering Goodies
(architects.dzone.com)
16958.
Is Java Dead or Invincible?
(javacodegeeks.com)
16959.
Youthful Arrogance - Advice for students
(indiangeek.net)
16960.
Optimizing MySQL for Flash
(tokutek.com)
16961.
The Foundry and Luxology join forces
(thefoundry.co.uk)
16962.
16963.
16964.
16965.
Amazon Needs a Kindle API for Researchers
(pluckypika.com)
16966.
Multiple-Round Strategy
(vcexperts.com)
16967.
By Simply Sharing, Doctors Could Unlock the Genome's Potential
(technologyreview.com)
16968.
Designing for Accessibility: Q&A with Jeff Wieland
(facebook.com)
16969.
Apple Maps: Stepping Backward While Marketing Forward
(jim-silverman.com)
16970.
Interactive News Graphics
(marijerooze.nl)
16971.
Announcing File Upload Support for ThetaBoard Θ
(thetaboard.com)
16972.
Braun vs. Apple: Is copying designs theft or innovation?
(themanufacturingrevolution.com)
16973.
Automatic Patch-Based Exploit Generation is Possible
(cs.cmu.edu)
16974.
The Chasm Has Evolved - Geoffrey Moore's Talk at MaRS
(youtube.com)
16975.
If everything is important, then nothing is
(robertgreiner.com)
16976.
Docked and Bubble modes FTW Cool new rendering modes for tablets/smartphones
(blog.mobiscroll.com)
16977.
16978.
How To Mow Your Lawn With Solar Power
(cleanairlawncare.com)
16979.
“Hopeless” Foxconn Workers Are Making the iPhone 5
(kotaku.com)
16980.
Bypassing WAFs with non-alphanumeric XSS
(blog.infobytesec.com)