September 2015 Archive
3391.
From Syria to Sudan: How do you count the dead? (theguardian.com)
3392.
Building the atom bomb: the full story of the Nevada Test Site (theguardian.com)
3393.
Unity3D has also been backdoored by XCodeGhost author (translate.google.com)
3394.
The Aging Advantage (psmag.com)
3395.
Hackers Took Fingerprints of 5.6M U.S. Workers, Government Says (nytimes.com)
3396.
Faceless Together (kazerad.tumblr.com)
3397.
Linus Torvalds – secure computing is a dream (bgr.com)
3398.
One month with the OnePlus 2 (venturebeat.com)
3399.
Going to GitHub Universe? This tool may help you meet interesting people (hitchhikers.gitter.im)
3400.
Light-based memory chip is first to permanently store data (news.sciencemag.org)
3401.
Show HN: If a Tree Falls in the Forest, an indie horror game written in Clojure (sisyphus.rocks)
3402.
The Serpent in the Sword: Pattern-Welding in Early Medieval Swords (1997) [pdf] (vikingsword.com)
3403.
I have issued a 37 day stay for Richard Glossip (twitter.com)
3404.
John Titor (en.wikipedia.org)
3405.
Import 10M StackOverflow questions in Neo4j (neo4j.com)
3406.
Woofmark: Markdown, HTML, and WYSIWYG Editor (bevacqua.github.io)
3407.
Episodes in the Life of Bounce (cabinetmagazine.org)
3408.
Open-Source Retreat 2016 (stripe.com)
3409.
A Toure of Bootloading (cs.dartmouth.edu)
3410.
Modelling the Effect of Your Super Users with Netlogo Simulation (blog.loyaltybay.co.uk)
3411.
Ask HN: Live TV streaming provider ()
3412.
Show HN: The Kano HD Screen Kit for Raspberry Pi (kano.me)
3413.
The Neural Basis of Multitasking (neurosciencenews.com)
3414.
Food Industry Enlisted Academics in G.M.O. Lobbying War, Emails Show (nytimes.com)
3415.
Unreliable Failure Detectors for Reliable Distributed Systems (1996) [pdf] (zoo.cs.yale.edu)
3416.
Intro to CSS 3D transforms (desandro.github.io)
3417.
RAET (Reliable Asynchronous Event Transport) Protocol (github.com)
3418.
19 Tips for Everyday Git Use (alexkras.com)
3419.
Beyond the Browser: Artillery’s Native Game Client (blog.artillery.com)
3420.
On chain rule, computational graphs, and backpropagation (outlace.com)