Using V-Models for Testing
(blog.sei.cmu.edu)
May 2015 Archive
3241.
3242.
The importance of strong and fast cryptography
(blog.pfsense.org)
3243.
3244.
Noot: Spaced repetition flashcards
(noot.io)
3245.
How to Make Your Google+ Account Completely Private
(shkspr.mobi)
3246.
3247.
3248.
Satisficing vs. Optimizing
(moshe-online.com)
3249.
A Tech Boom Aimed at the Few Instead of the World
(nytimes.com)
3250.
3251.
Every Important SaaS Metric in a Single Infographic
(blog.rjmetrics.com)
3252.
Stripe in Talks for Up to $500M in New Funding
(techcrunch.com)
3253.
Software Evolution, Maintenance, Improvement Method Guide
(aim42.github.io)
3254.
3255.
Building a secure computer system (1988) [pdf]
(cs.unomaha.edu)
3256.
Will Superintelligent AI Ignore Humans Instead of Destroying Us?
(motherboard.vice.com)
3257.
Implementing CoAP the Secure Way, Part I: Fundamentals
(blog.nvisium.com)
3258.
3259.
Consul in a Microservices Environment at Neofonie GmbH
(hashicorp.com)
3260.
Social Network Inspired Learning Community
(learnquiq.com)
3261.
Everything You Ever Wanted to Know About Message Latency [pdf]
(computernetworks5e.org)
3262.
3263.
Why are there so few women in Linux? (2002)
(tldp.org)
3264.
Side-Channel Power Analysis of AES Core in Project Vault
(colinoflynn.com)
3267.