Lawful Hacking After the Encryption Debate
(justsecurity.org)
October 2015 Archive
13471.
13472.
30 Minutes of Code
(medium.com)
13473.
Sokal affair
(en.wikipedia.org)
13474.
Why Are There 2 Ways to Write the Lowercase Letter ‘A’?
(upvoted.com)
13475.
Autechre: A Ghost in the Machine
(m.sfweekly.com)
13476.
Best software for entropy generation on Linux VM /dev/random
(volumelabs.net)
13477.
13478.
Tipping Is Strange, and Strangely Hard to Get Rid Of
(bloombergview.com)
13479.
Gsick opens membership
(gsick.com)
13480.
13481.
Is an alien megastructure causing a distant star to flicker?
(bostonglobe.com)
13482.
Correspondence between Web Summit and Irish government [pdf]
(files.websummit.net)
13483.
Playing with Amazon Dash
(aminastaneh.net)
13484.
Demystifying Customer Lifetime Value (with Exclusive Data from Compass)
(blog.startupcompass.co)
13485.
13486.
13487.
Bank of Canada urges Star Trek fans to stop “Spocking” its fivers
(dangerousminds.net)
13488.
Haven is shutting down, and these are my thoughts
(craigsturgis.com)
13489.
Ivy League schools hate these college rankings
(finance.yahoo.com)
13490.
13491.
13492.
Elon Musk and Sam Altman on Thinking for the Future
(youtube.com)
13493.
13494.
Cons conflict resolved at last
(jwz.org)
13496.
Samurai Slices a 100 Mph Baseball in Half
(kotaku.com)
13497.
The Bitcoin Lightning Network
(lightning.network)
13498.
Aerojet Rocketdyne's failed attempt to shut out Blue Origin
(popularmechanics.com)
13499.
13500.
Words of warning from a Chinese startup founder, one year in
(techinasia.com)