November 2013 Archive
4441.
The Z-80's 16-bit increment/decrement circuit reverse engineered (righto.com)
4442.
Inspiring Letter from Berkeley Math Professor (imgur.com)
4443.
Securing Peer to Peer Fog of War against Map Hacks (twistedoakstudios.com)
4444.
Loss Ratios In Early Stage VC (avc.com)
4445.
How to Opt Out of Data Tracking on Your Most-Used Sites (mashable.com)
4446.
David Cameron Calling For Permanent Austerity In Front Of Ridiculous Gold Things (businessinsider.com)
4447.
Nginx like a pro - an optimized setup guide (blog.zachorr.com)
4448.
When Inuit.css is a better choice than Bootstrap (shellycloud.com)
4449.
What the Silk Road Crackdown Means for Privacy (exitevent.com)
4450.
Yes I Saw Your Text, But Don’t Expect Me to Respond Instantly (medium.com)
4451.
Back to the Future: 1.21 petaFLOPS, 156,000-core (blog.cyclecomputing.com)
4452.
Fixing my old code makes me want to cry (swizec.com)
4453.
Managing relationships with VCs before they invest in your round (epaley.com)
4454.
A Portscan by Email – HTTP Over X.509 Revisited (blog.nruns.com)
4455.
CyanogenMod is in Google Play (play.google.com)
4456.
Ladar Levison (Lavabit operator) vs. Moxie Marlinspike (reddit.com)
4457.
An ambitious experiment in Data Science takes off (blog.fperez.org)
4458.
SISCOG slides on their experience using Lisp since 1986 (siscog.eu)
4459.
Fake it till you make it (medium.com)
4460.
Google India Ad (youtube.com)
4461.
FreedomSponsors has a new design (freedomsponsors.org)
4462.
Make Beautiful Graphics Quickly With Canva (mashable.com)
4463.
Draft text for the TPP Intellectual Property Rights Chapter leaked (wikileaks.org)
4464.
Show HN: Hipster CEO - A Tamagotchi-App For Entrepreneurs (hipsterceo.com)
4465.
Show HN: social search done right (nuggety.com)
4466.
Tracking business metrics with Geckoboard (infinum.co)
4467.
Integer Undefined Behaviors in Open Source Crypto Libraries (blog.regehr.org)
4468.
Selling a side project for almost nothing.. (position-absolute.com)
4469.
Stanford Security Lab is crowdsourcing a study of the NSA phone metadata program (cyberlaw.stanford.edu)
4470.
Visual how-to guide for SELinux policy enforcement (opensource.com)