March 2016 Archive
10591.
The Symptoms Are Not the Disease (socrates.berkeley.edu)
10592.
The Most Powerful Lesson I’ve Ever Learned in Business (medium.com)
10593.
TDD: How to use Math to get into it (nelsonsar.github.io)
10594.
The Risk of Artificial Intelligence – What Are the Dangers of Smarter Machines? (we-p.com)
10595.
Yahoo’s Fire Sale Is Imminent (vanityfair.com)
10596.
The new headphone king: B&O H6 (2nd generation (marco.org)
10597.
Comment on “Estimating the reproducibility of psychological science” (projects.iq.harvard.edu)
10598.
Google Chrome v49 Changed How Page Actions Are Displayed
10599.
What is your favorite email client for Mac? (leadboxer.com)
10600.
Show HN: Iterograph – Iterative Art Generator (iterograph.laboiteatortue.com)
10601.
Quantum Computer Comes Closer to Cracking RSA Encryption (spectrum.ieee.org)
10602.
Unequal Pay: The Worst and Best Cities for Women in Tech (xconomy.com)
10603.
Show HN: Poll maker that can handle open-ended questions and filter results (youmatchup.com)
10604.
The Real Face of Jesus (redbookmag.com)
10605.
Vux: Mobile Web UI Based on Vue and Weui (github.com)
10606.
Scientists 'find cancer's Achilles heel' (bbc.com)
10607.
Making voice calls in Slack (get.slack.help)
10608.
Ask HN: How practical would it be to steal the source code of a ReactJS app?
10609.
Ask HN: Measuring how broken the office Internet connection is
10610.
Ask HN: Bootcamp ads on trains in London
10611.
400Gbps: Winter of Whopping Weekend DDoS Attacks (blog.cloudflare.com)
10612.
Surprise Is the Key to Unlocking a Creative Culture (minutehack.com)
10613.
Bash aliases for Django (github.com)
10614.
How to newsjack any conference in 1 hour (irishtechnews.net)
10615.
Deposits.org API Access
10616.
Ask HN: What's important to you when reviewing terms of service
10617.
When traveling meteor cordova coder needs “non client isolated” wifi
10618.
Amazon removed device encryption from Fire OS 5 because no one was using it (arstechnica.com)
10619.
Quiver – A Dropbox-like cloud storage platform with file protection features (medium.com)
10620.
Shor's algorithm is implemented using five trapped ions (physicsworld.com)