January 2015 Archive
2521.
How Sharpton gets paid to not cry ‘racism’ at corporations (nypost.com)
2522.
DuckDuckGo instead of Google on your new tab (chrome.google.com)
2523.
From JavaScript to ClojureScript [video] (youtube.com)
2524.
Show HN: Hackbook – Follow HN users, get notifications and view deleted comments (hackbook.club)
2525.
DEAP is hunting dark matter (symmetrymagazine.org)
2526.
Wearable tech promises mood-on-demand with DIY ECT (dailydot.com)
2527.
About the Critical Security Issue in the Aviator Browser (github.com)
2528.
E-Money (That's What I Want) (1994) (archive.wired.com)
2529.
Modern web browsers are the emacs of this decade (reddit.com)
2530.
Is the secret to a successful crowdfunding campaign moving to a beach house? (medium.com)
2531.
Translate any JSON object into valid Go Struct (jsonstruct.com)
2532.
Everybody in Uganda Is Kung Fu Fighting (roadsandkingdoms.com)
2533.
A motion–capture approach to detecting deceit [pdf] (cl.cam.ac.uk)
2534.
Show HN: The Ultimate Guide to EU VAT MOSS (infography) (quaderno.io)
2535.
Libreboard, an open source project that mimics Trello features (github.com)
2536.
Show HN: HNBuzz – daily/weekly digests, full-text search and mobile awesomeness (hnbuzz.com)
2537.
CodeSchool, Acquired by PluralSight (techcrunch.com)
2538.
Efficient transformation of Adjacency Matrix using cache optimized C++ code (medium.com)
2539.
People Hire Clones of Themselves (mattblodgett.com)
2540.
Only 25Mbps and up will qualify as broadband under new FCC definition (arstechnica.com)
2541.
Pinpoint: open-source APM for JVM (github.com)
2542.
Artifacts that prove the non-existence of a coin-op failure (bunnyears.net)
2543.
More Mongo than Mongo (hackingdistributed.com)
2544.
An IRC client in PicoLisp (picolisp.com)
2545.
Advice to First-Time Founders (firstround.com)
2546.
A route-matching, block-based way to handle deep links (github.com)
2547.
TrackingPoint Takes Aim at the Future of Firearms Targeting (techcrunch.com)
2548.
Lies We Tell About Lenin (jacobinmag.com)
2549.
NIST Revises Crypto Standards Guide (govinfosecurity.com)
2550.
Moonpig vulnerability (ifc0nfig.com)