Linguistic Anonymity on the Internet
(daily.jstor.org)
June 2015 Archive
2581.
2582.
2583.
Yeti programming language
(mth.github.io)
2584.
Why didn’t my app throw an OutOfMemoryError? (2014)
(weblogs.java.net)
2585.
Hooking up: zapping your brain
(thelongandshort.org)
2587.
Hacking StumpWM with Common Lisp
(kaashif.co.uk)
2588.
Utter Disregard for Git Commit History
(zachholman.com)
2589.
You Can Be Prosecuted for Clearing Your Browser History
(thenation.com)
2590.
Small Multiple Maps with D3
(blog.webkid.io)
2591.
Every Single Web Portfolio Ever
(medium.com)
2592.
A History of 'Tcl in the Browser' (2011)
(books.google.com.au)
2593.
Protocol-Oriented Programming in Swift
(developer.apple.com)
2594.
Babel in Khan Academy's Internationalization Toolchain
(engineering.khanacademy.org)
2595.
2596.
How Elephant Poop Is Helping Nab Ivory Poachers
(smithsonianmag.com)
2597.
The Psychology of Skyscrapers
(fastcodesign.com)
2598.
2599.
One Up: Building Machine Learning Pipelines with Mario
(intentmedia.com)
2600.
Kaspersky Lab cybersecurity firm is hacked
(bbc.co.uk)
2601.
Go Ask Alice – What Really Went on in Wonderland
(newyorker.com)
2602.
2603.
Exercise 20: Zed's Awesome Debug Macros
(c.learncodethehardway.org)
2604.
New remote exploit leaves most Macs vulnerable to permanent backdooring
(arstechnica.com)
2605.
The Extent and Consequences of P-Hacking in Science
(journals.plos.org)
2606.
Graylog 1.1 released
(graylog.org)
2607.
Thinking with Annotated Books: The Honnold-Mudd Fourth Folio
(marissanicosia.wordpress.com)
2608.
Programming AudioVideo on the Raspberry Pi GPU
(jan.newmarch.name)
2609.
IBM pledges to devote 3500 researchers to Apache Spark
(techcrunch.com)
2610.