August 2016 Archive
7861.
The next gen wireless--“5G”--is all hype (backchannel.com)
7862.
Startups, Metrics, and Intellectual Honesty (medium.com)
7863.
The Moral Machine (moralmachine.mit.edu)
7864.
Vulnerability in the Linux kernel's tcp stack implementation (blogs.akamai.com)
7865.
Don’t let anyone overpay you (m.signalvnoise.com)
7866.
Powerful AWS Platform Features, Now for Containers (aws.amazon.com)
7867.
Ask HN: Is it okay to not sending monthly receipt to users?
7868.
Paralysed patient walks again in astonishing medical breakthrough (independent.co.uk)
7869.
Indieweb Technology Frees Me from “Awaiting Moderation” (boffosocko.com)
7870.
GammaRF (github.com)
7871.
Ballmer Laughs at iPhone [video] (2007)
7872.
Lock It and Still Lose It–on the (In)Security of Auto Remote Keyless Entry Systems (usenix.org)
7873.
Connecting Amazon IoT Button to Weather, Stripe and Restaurants (medium.com)
7874.
Adding Analog Support for the Apple II to Ninepin (insentricity.com)
7875.
Xperiel – cloud-based platform that can build apps for the IoT (marketingland.com)
7876.
France says fight against messaging encryption needs worldwide initiative (reuters.com)
7877.
Why do some people think Twitter is shutting down in 2017? (bbc.co.uk)
7878.
Just dumb pipes?
7879.
[CVE-2016-6317] Unsafe Query Generation Risk in Active Record (groups.google.com)
7880.
Greenland Sharks Can Live for 400 Years (time.com)
7881.
Wall Street runs the 2nd largest charity in America (nybooks.com)
7882.
Streaming MySQL tables in real-time to Kafka (engineeringblog.yelp.com)
7883.
Balancing Your Programming Skills Portfolio (programmingzen.com)
7884.
Toshiba to release 100TB SSD (theregister.co.uk)
7885.
ByzCoin: Securely Scaling Blockchains (hackingdistributed.com)
7886.
The Nightmare Scenario (math.columbia.edu)
7887.
Netlist's HybriDIMM Outperforms SSDs 1000x by Bonding Flash to DDR4 SDRAM (forums.xilinx.com)
7888.
To Tweet a Mockingbird (turingjump.com)
7889.
IMDB Data Visualizations with D3 and Dimple.js (andreykurenkov.com)
7890.
Linux vulnerability leaves top sites wide open to attackers (rt.com)