Web bloat solution: PXT Protocol
(svedic.org)
August 2016 Archive
11491.
11492.
11493.
11494.
As 3D printers break through, EU expands copyright and extends term by century
(privateinternetaccess.com)
11495.
Nice killer had five accomplices, planned for months
(thevillagessuntimes.com)
11496.
11497.
Dinner, Disrupted
(nytimes.com)
11498.
11499.
Do Your Friends Actually Like You?
(nytimes.com)
11500.
New Underwater Sound Superhighway
(nautil.us)
11501.
Security Myths and Passwords (2006)
(cerias.purdue.edu)
11502.
11503.
The resurgence of downtown Detroit
(dirt.asla.org)
11504.
On the Growth of Dollar Shave Club to $1BN Acquisition
(limorgoldhaber.co)
11505.
Internet business is about setting a target and moving on
(theinternetbusinessblog.com)
11506.
Dynamically mock server behaviors and APIs in Swift
(github.com)
11507.
Research suggests being lazy is a sign of high intelligence
(independent.co.uk)
11508.
11509.
11510.
11511.
Tidy Desk or Messy Desk? Each Has Its Benefits
(psychologicalscience.org)
11512.
How hackers are targeting the Olympics
(fastcompany.com)
11513.
11514.
Zoo hypothesis
(en.wikipedia.org)
11515.
You Are Not a Commodity
(medium.com)
11516.
CORD – Tying the Knot with Access Networks
(stratoscale.com)
11517.
OnionScan Report: July 2016 – HTTPS Somewhere Sometimes
(mascherari.press)
11518.
The end of globalization: international security implications
(warontherocks.com)
11519.
A Hacker's Tips for Overthrowing the Government
(gizmodo.com)
11520.
REQUIEM FOR a DREAM
(newyorker.com)