August 2014 Archive
2761.
Show HN: Following, a tiny Twitter game built in ReactJS (followingapp.herokuapp.com)
2762.
Could a Quantum Computer Have Subjective Experience? (scottaaronson.com)
2763.
Docker Do's and Don'ts (devo.ps)
2764.
Not everything is awesome (labs.ft.com)
2765.
The Star Wars George Lucas Doesn't Want You to See (theatlantic.com)
2766.
35 Innovators Under 35 – 2014 (technologyreview.com)
2767.
Binding Go and Java (golang.org)
2768.
ODesk is screwing employers with their new “Hire for Trial Project” feature (medium.com)
2769.
We vetted an idea in 30 days. Then killed it (loganrandolph.com)
2770.
The Visual Microphone (people.csail.mit.edu)
2771.
20 short tutorials all data scientists should read (and practice) (datasciencecentral.com)
2772.
Sliced Investing (YC S14) Brings Hedge Fund Access to the Common Investor (techcrunch.com)
2773.
Evolving the JVM: Principles and Directions [pdf] (cr.openjdk.java.net)
2774.
Gamma International Leaked (reddit.com)
2775.
Could Lego Architecture Studio actually be useful for architects? (theguardian.com)
2776.
Bitcoin Transaction Malleability Theory in Practice [pdf] (blackhat.com)
2777.
The Future of Mapping: An Interview with Clement Valla (blog.art21.org)
2778.
Sofa.io: an SDK for building e-commerce web apps (sofa.io)
2779.
Netflix Says U.S. Bandwidth Speeds Trail Most Other Countries It Tracks (variety.com)
2780.
Cheat Sheet: Writing Python 2-3 compatible code (python-future.org)
2781.
Blog Rebuild: Build Systems and Cross-Compiling (jlongster.com)
2782.
Advanced Content Promotion Checklist (process.st)
2783.
Show HN: Build Websites Without Code – A free tutorial on Webflow (bloc.io)
2784.
The 30-year-old health sector billionaire (bbc.co.uk)
2785.
A Hair Salon Guru’s Next Big Thing: Ending Shampoo (wired.com)
2786.
Mapping the Spread of the Military’s Surplus Gear (nytimes.com)
2787.
Why the 35-year-old C++ still dominates 'real' dev (infoworld.com)
2788.
Internet friends, we need your help (medium.com)
2789.
John Comenius and the First Children’s Picture Book (publicdomainreview.org)
2790.
The Security of al Qaeda Encryption Software (schneier.com)