August 2014 Archive
10441.
Using the 2.0 Blockchain (airpair.com)
10442.
What happens when an elite American university kills grade inflation (qz.com)
10443.
Guy leaves driver's seat in 'self-driving' car (motorauthority.com)
10444.
Analysis of JS Frameworks and their employability (msgooroo.com)
10445.
Justin Amash’s victory speech (washingtonpost.com)
10446.
Wikimedia sides with monkey in photo copyright battle over macaque's selfie (smh.com.au)
10447.
Gmail can't properly handle a “?” in their URL (gmail.com)
10448.
CouchDB Bylaws (couchdb.apache.org)
10449.
Zeroweight (github.com)
10450.
Act Like an Entrepreneur Inside Your Organization (blogs.hbr.org)
10451.
TinyTesla: the Little Singing Tesla Coil Anyone Can Build (kickstarter.com)
10452.
NASA's Fuel-Free Rocket Thruster Is Literally Too Good to Be True (thedailybeast.com)
10453.
Enable execution of Java methods on GPU (bugs.openjdk.java.net)
10454.
Power down at Antarctic base (antarctica.ac.uk)
10455.
New investment values 'startup cloning factory' Rocket Internet at $4.4B (tech.eu)
10456.
Nanu – free calls with 2g (hellonanu.com)
10457.
FireEye and Fox-IT Announce New Service to Help CryptoLocker Victims (fox-it.com)
10458.
LinkedIn API, yet another issue (developer.linkedin.com)
10459.
Mind numbingly simple and fast parallel processing in Ruby (github.com)
10460.
For better or worse, Fish Plays Pokemon is now a thing (vg247.com)
10461.
Genetic Sexual Attraction, husband and wife discover they are brother and sister (independent.co.uk)
10462.
Russia hits West with food import ban in sanctions row (bbc.co.uk)
10463.
History Will Be Written by the Bots (globalguerrillas.typepad.com)
10464.
Swedish Wikipedia surpasses 1M articles with aid of article creation bot (blog.wikimedia.org)
10465.
Reusable workflow library for Django (github.com)
10466.
Lyricize: A Flask app to create lyrics using Markov chains (realpython.com)
10467.
KeenCon 2014 (keen.io)
10468.
Trading easiness for guarantee (medium.com)
10469.
Second release of KDE Frameworks 5 (kde.org)
10470.
How to Keep Data Out of Hackers’ Hands (nytimes.com)