November 2015 Archive
841.
Microsoft Bob Taking Up Space (2008) (technet.microsoft.com)
842.
What is a stateless user interface? (blog.ezyang.com)
843.
Sam Altman Is Bullish on Biotech Startups (wired.com)
844.
Endless Sky: Open-Source Escape Velocity Successor (endless-sky.github.io)
845.
Nearly 9,000 Artifacts Uncovered in CA Desert, Spanning 11,500 Years of History (westerndigs.org)
846.
New Dell computer comes with a eDellRoot trusted root certificate (joenord.blogspot.com)
847.
Death in Airbnb Rental Raises Liability Questions (nytimes.com)
848.
Japan's economy falls back into recession (bbc.com)
849.
The mid-Victorian diet was a mini golden age of nutrition (health.spectator.co.uk)
850.
The World Is Not Falling Apart (2014) (slate.com)
851.
Why root for Groupon? (medium.com)
852.
Leading 'anti adblock' provider gets hacked- pushed malware to end users (blog.pagefair.com)
853.
CIA Email Hackers Return with Major Law Enforcement Breach (wired.com)
854.
Early lessons from the micro-purchase experiment (18f.gsa.gov)
855.
Making a pencil from scratch (2013) (gse-compliance.blogspot.com)
856.
In the 1960s, hundreds of pounds of uranium went missing in Pennsylvania (foreignpolicy.com)
857.
ChucK: Strongly-Timed Music Programming Language (chuck.cs.princeton.edu)
858.
Stonehenge Begins to Yield Its Secrets (nytimes.com)
859.
A New Microscope Can See Inside Moving Cells in Real Time (2014) [video] (motherboard.vice.com)
860.
Vitamin C kills tumor cells with hard-to-treat mutation in mice (news.sciencemag.org)
861.
SpaceX Falcon 9 debris from failed CRS-7 launch found in sea off Scilly (bbc.co.uk)
862.
Latest Android phones hijacked with one-shot Chrome exploit (theregister.co.uk)
863.
Blue Lion, a new OS/2 distribution (arcanoae.com)
864.
Theranos Letter Shows Elizabeth Holmes Tried to Take Control from Shareholders (forbes.com)
865.
Shopify grows Q3 revenue 93% (internetretailer.com)
866.
Elasticsearch end-of-life in Debian Stable (lists.debian.org)
867.
Apache Singa, a Distributed Deep Learning Platform (singa.incubator.apache.org)
868.
Hackers do the Haka – Advanced packet and stream manipulation language (thisissecurity.net)
869.
Anatomy of a Haskell-based Application (abailly.github.io)
870.
Show HN: BestRuby – Ruby Tricks, Idioms, Refactorings and Best Practices (best-ruby.com)