Aurora - New MySQL-Compatible Database Engine
(aws.amazon.com)
November 2014 Archive
121.
122.
Intel subsidiary fined for unlawful export of software that enables encryption
(goodwinprocter.com)
123.
Sell Services on Amazon
(services.amazon.com)
124.
Let’s Encrypt: Delivering SSL/TLS Everywhere
(letsencrypt.org)
125.
Colorado communities secure the right to build their own broadband
(washingtonpost.com)
126.
Google disables SSL search at BT’s request
(blog.al4.co.nz)
127.
Putting $10M into UBeam illustrates what is wrong with tech investing
(lookatmeimdanny.tumblr.com)
128.
On Linux, 'less' can probably get you owned
(seclists.org)
130.
Vulnerability in Microsoft TLS library could allow remote code execution
(technet.microsoft.com)
131.
Winamp 2 in HTML5
(jordaneldredge.com)
132.
The dark side of .io
(gigaom.com)
133.
Berlin’s digital exiles: where tech activists go to escape the NSA
(theguardian.com)
134.
135.
How a Shrimp Treadmill Became a Political Plaything
(chronicle.com)
136.
Judge threatens contempt for declining to reveal cellphone tracking methods
(baltimoresun.com)
137.
Why Silicon Valley Works
(blog.samaltman.com)
138.
Monkey Island – Insult Swordfighting Game
(int33h.com)
140.
Job brokers steal wages and entrap Indian tech workers in US
(theguardian.com)
142.
IE Web Development Support Moving to Stack Overflow
(social.msdn.microsoft.com)
143.
On the Effectiveness of Traffic Analysis Against Tor Networks Using Flow Records [pdf]
(mice.cs.columbia.edu)
144.
Introducing Visual Studio’s Emulator for Android
(blogs.msdn.com)
145.
Bup – towards the perfect backup
(wrouesnel.github.io)
146.
Handmade Hero: C game from scratch
(handmadehero.org)
147.
The Unreasonable Effectiveness of C (2013)
(damienkatz.net)
148.
Reflected File Download: A New Web Attack Vector
(drive.google.com)
149.
Google's phone number handling library
(code.google.com)
150.