Space Elevators Are Possible
(techblog.co)
February 2014 Archive
871.
872.
Can We Avoid a Surveillance State Dystopia?
(antipope.org)
874.
Why it's a bad idea to put a CNAME record on your root domain
(joshstrange.com)
875.
Unsung Hero of the Nuclear Age
(slate.com)
876.
On Programming Communities
(lucumr.pocoo.org)
877.
Startup Fundraising Lessons For The 99%
(pando.com)
878.
Rust RFC: Opt-in Builtin Traits
(smallcultfollowing.com)
879.
Where are the hacker news on Hacker news?
(itceterablog.blogspot.hu)
881.
Throwing in the towel on becomming a programmer
(waterstreetgm.org)
882.
The Couple That Pays Each Other to Put Kids to Bed
(nbcnews.com)
883.
Mercurial 2.9 released
(mercurial.selenic.com)
884.
Why Did Symbolics Fail? (2009)
(danweinreb.org)
885.
Mt. Gox may have lost 750,000 bitcoins
(two-bit-idiot.tumblr.com)
886.
The C++ and programming books I recommend
(bert-hubert.blogspot.com)
887.
The 10x Engineer and Delegated Responsibility
(ianlotinsky.wordpress.com)
888.
889.
890.
891.
The Next Chapter
(simple.com)
892.
Great Algorithms that Revolutionized Computing
(en.docsity.com)
893.
Four Books to Master JavaScript Engineering
(dannygarcia.tumblr.com)
894.
Rails XSS vulnerability in number formatting (CVE-2014-0081)
(groups.google.com)
895.
Nokia Treasure Tag: Never lose your valuables again
(conversations.nokia.com)
896.
Heap's new interface for analytics: clicking around your site
(blog.heapanalytics.com)
897.
FOSDEM 2014 – First videos are online
(fosdem.org)
898.
Hitchhiker's Guide to Clojure
(gigasquidsoftware.com)
899.
California Law to Require Antitheft Technology in Cellphones
(bits.blogs.nytimes.com)
900.