August 2010 Archive
5161.
Relieving blog comment spam (swimwithoutgettingwet.com)
5162.
Generating Kickstarter Project Blurbs from Markov Chains (fredbenenson.com)
5163.
50 million RubyGems downloads (rubygems.org)
5164.
NodeKnockout'ers try to make a retro MMO in 2 days (Chrome only) (retrocrawl.com)
5165.
Equity vs. Convertible Debt: VCs Debate Shifting Investment Trends (readwriteweb.com)
5166.
Closure Compiler: This Var is My Var (closuretools.blogspot.com)
5167.
Twitter Ending Basic Auth Support At 8 AM PT (blog.twitter.com)
5168.
The coming Oauthcalypse (scripting.com)
5169.
Obama to loosen export controls (csmonitor.com)
5170.
ClojureCLR: Installing, generics, and debugging on .NET (jierenchen.com)
5171.
A Collection of Mini Icon Sets (webdesignerdepot.com)
5172.
Setting up a tech consultancy in San Francisco (richardboardman.com)
5173.
Bedbugs Crawl, They Bite, They Baffle Scientists (nytimes.com)
5174.
Manifesto for Half-Arsed Agile Software Development (halfarsedagilemanifesto.org)
5175.
Samsung Shifts Strategy In Challenge To Apple (bloomberg.com)
5176.
Where the Super-Brains Are (theatlantic.com)
5177.
Autodesk to Reintroduce AutoCAD for Apple Macs (nytimes.com)
5178.
Morning is Wiser Than Evening (ribbonfarm.com)
5179.
Gruber vs Chpwn (blog.wisser.me)
5180.
Gmail's "Priority Inbox" sorts important e-mail for you (arstechnica.com)
5181.
Tennis Becomes a Numbers Game (online.wsj.com)
5182.
BP releases 538k pounds of toxic gas in Texas City (nytimes.com)
5183.
Canada forces telecom competition, limits mark-up (news.yahoo.com)
5184.
Making sense of dojo.when: A simple XHR caching example (blog.rebeccamurphey.com)
5185.
The US cyberstrategy 3.0 risks starting Cold War 2.0 (blogs.techworld.com)
5186.
Netflix's vacation policy -- the tip of a radical compensation iceberg (views.washingtonpost.com)
5187.
Forth is broken by culture? (groups.google.com)
5188.
A social conference directory (lanyrd.com)
5189.
When Eating and Exercise are Out of Balance, Productivity Plummets (victusspiritus.com)
5190.
Judge Rules Cell-Site Data Protected By Fourth Amendment Warrant Requirement (volokh.com)