March 2016 Archive
211.
The Next Front in the New Crypto Wars: WhatsApp (eff.org)
212.
2016 Stack Overflow Developer Survey Results (stackoverflow.com)
213.
Study: People Want Power Because They Want Autonomy (theatlantic.com)
214.
Brendan Eich: WebAssembly is a game-changer (infoworld.com)
215.
GNU Gneural Network (gnu.org)
216.
Show HN: Honest Salary – Help make salaries fair and honest by sharing yours (honestsalary.com)
217.
CEO (jacquesmattheij.com)
218.
Zaha Hadid, Groundbreaking Architect, Has Died (nytimes.com)
219.
Lisp Flavoured Erlang 1.0 released after 8 years of development (github.com)
220.
HN: Please add Reddit style collapsible comments
221.
Unexpected evidence of a new particle at LHC (nature.com)
222.
An XSS on Facebook via PNGs and Wonky Content Types (fin1te.net)
223.
The Chrome Distortion: how Chrome negatively alters our expectations (blog.runspired.com)
224.
War Is a Racket (1935) (ratical.org)
225.
How to Hack an Election (bloomberg.com)
226.
How to reduce the cognitive load of your code (chrismm.com)
227.
Linux at 25: Q&A with Linus Torvalds (spectrum.ieee.org)
228.
Real-Time Django: Get Started with Django Channels (blog.heroku.com)
229.
In Syria, militias armed by the Pentagon fight those armed by the CIA (latimes.com)
230.
Statisticians Find They Can Agree: It’s Time to Stop Misusing P-Values (fivethirtyeight.com)
231.
Stop Using the Daylight Savings Time (stopdst.com)
232.
Legal marijuana is taking a bite out of drug cartels' profits (washingtonpost.com)
233.
Go channels are bad (jtolds.com)
234.
America's High School Graduates Look Like Other Countries' High School Dropouts (wamc.org)
235.
Python 3 Is Winning Library Developer Support (blogs.msdn.microsoft.com)
236.
$ cat ~/myfile | curl -X PUT --upload-file “-” https://transfer.sh/myfile.txt (transfer.sh)
237.
FBI’s Comey Concedes Mistake Was Made Over iPhone in San Bernardino Case (wsj.com)
238.
Eric Schmidt to head new Pentagon innovation board (reuters.com)
239.
Twitter shut down Emojitracker's access (medium.com)
240.
FBI Wants It to Be Impractical to Deploy Strong Encryption Without Key Escrow (rietta.com)