The 48 Laws of Power
(www2.tech.purdue.edu)
April 2009 Archive
271.
272.
Vernor Vinge predicts singularity by 2030
(hplusmagazine.com)
273.
We Drive the Aptera, and It's a Real Car
(blog.wired.com)
275.
Wilson Sonsini Term Sheet Generator
(wsgr.com)
276.
ISPs refuse to shut down Pirate Bay
(thelocal.se)
277.
Generalizing from one example
(lesswrong.com)
279.
Lisp's reputation is so bad that many people don't even take a look at Lisp
(ilc2009.scheming.org)
280.
YouTube Is Doomed
(businessinsider.com)
282.
283.
Twitter XSS Worm writer Mikeey gets hacked
(seclists.org)
284.
Tutorial: Setup EC2 for Rails/Merb/Sinatra using Chef
(probablyinteractive.com)
285.
Twitter OAuth Outage Was A Vulnerability In OAuth Itself
(groups.google.com)
286.
Django File Browser
(code.google.com)
287.
288.
Peeping into Memcached
(blog.evanweaver.com)
289.
Game Developers and Porn Stars
(killtenrats.com)
290.
Yahoo Quietly Pulls The Plug On Geocities
(techcrunch.com)
291.
What we did to (not) get into TechStars
(blog.aisleten.com)
292.
The Facebook Open Stream API
(developers.facebook.com)
293.
I am not a Pr0n Star: avoiding unavoidable associations
(lizkeogh.com)
294.
E Text Editor: Releasing the Source
(e-texteditor.com)
295.
296.
Django Best Practices
(lincolnloop.com)
297.
Radiohead to Testify Against the RIAA
(torrentfreak.com)
298.
299.
300.
FBI Defends Disruptive Raids on Texas Data Centers
(blog.wired.com)