The Underhanded C Contest: Weak Encryption (2007)
(underhanded.xcott.com)
March 2015 Archive
1351.
1352.
1353.
Linux kernel initialization process, part 3
(github.com)
1354.
Don't depend on JavaScript to render your page
(blog.donnywals.com)
1355.
1356.
1357.
The new authoritarianism
(voxeu.org)
1358.
Does Amazon Web Services Pricing Follow Moore's Law?
(blog.atomicinc.com)
1360.
DoorDash Raises $40M, Led by Kleiner Perkins Caufield and Byers
(blog.doordash.com)
1361.
1362.
Show HN: The Daily Drop – Discover the Newest EDM Tracks
(thedailydrop.co)
1364.
The forgotten history of human zoos
(the-open-mind.com)
1365.
Tracking Joy at Work
(begriffs.com)
1366.
1367.
Creating Maintainable UIs with React and Meteor
(blog.percolatestudio.com)
1368.
Teach or Perish
(chronicle.com)
1369.
The odd life of an underground orchid
(earthsky.org)
1370.
1371.
A dashboard for my apartment
(iinteractive.com)
1372.
For Pearson, Common Core Is Private Profit
(america.aljazeera.com)
1373.
Show HN: WIP C compiler in Go, inspired by 8cc
(github.com)
1374.
1375.
Jupiter Is a Garden of Storms
(nautil.us)
1376.
What is an 83(b) election? (2008)
(startupcompanylawyer.com)
1377.
1378.
Ideal Hash Trees (2001) [pdf]
(infoscience.epfl.ch)
1379.
Exceptional Iron-Age elite tomb discovered in France
(pasthorizonspr.com)
1380.