November 2016 Archive
6331.
Linux Open Source Operating Systems for IoT (open-electronics.org)
6332.
Offline Storage, Improved. Wraps IndexedDB, WebSQL or LocalStorage (github.com)
6333.
We Become What We Behold, a Post-Mortem (blog.ncase.me)
6334.
Red Pitaya: Open Source Multi-Measurement Solution (redpitaya.com)
6335.
How one family is sending 13 kids to college (washingtonpost.com)
6336.
Haskell bindings for TensorFlow (github.com)
6337.
Don't use JSON for messaging (highscalability.com)
6338.
What Artificial Intelligence Can and Can’t Do Right Now (hbr.org)
6339.
Two-factor authentication on Wikipedia for admins and up (davidgerard.co.uk)
6340.
The confusion around Data Science roles and responsibilities (nicolabortignon.com)
6341.
JavaScript isn't Scheme (journal.stuffwithstuff.com)
6342.
Facebook, in Cross Hairs After Election, Is Said to Question Its Influence (nytimes.com)
6343.
The Document Which Used to Be Called the MIT Lockpicking Guide (1992) (blurofinsanity.com)
6344.
Moissanite (en.wikipedia.org)
6345.
Porting DooM to the x68000 (virtuallyfun.superglobalmegacorp.com)
6346.
Kadena open sources new smart contract language, Pact (kadena.io)
6347.
Microservices with Distributed Actor Systems (juptr.io)
6348.
Golem is a global prosumer market for computing power (golem.network)
6349.
Golem's 'Airbnb' for Computing Crowdsale Scores $8.6M in Minutes (forbes.com)
6350.
Learning to Protect Communications with Adversarial Neural Cryptography (arxiv.org)
6351.
You may want to hide your personal e-mail on GitHub (giuseppegurgone.com)
6352.
British Airways Flight 5390 (en.wikipedia.org)
6353.
Security in-a-box – tools and tactics for digital security (securityinabox.org)
6354.
Billion Mobile Apps Exposed to Account Hijacking Through OAuth 2.0 Flaw [pdf] (blackhat.com)
6355.
Why I Created Timewarp (Chrome Extension) (medium.com)
6356.
InfiniBand Breaks Through the 200G Barrier (nextplatform.com)
6357.
Oops I did it again, being a nice girl and the boss (medium.com)
6358.
JVM Boost Shows Warm Java Is Better Than Cold (nextplatform.com)
6359.
In a Job Interview, This Is How to Acknowledge Your Weaknesses (linkedin.com)
6360.
CSI meets public wifi: Inferring your mobile phone password via wifi signals (blog.acolyer.org)