April 2016 Archive
3151.
Belle II and the matter of antimatter (symmetrymagazine.org)
3152.
Handyman – A Multiuser Puppeteering System for Motion Control (1991) (web.ncf.ca)
3153.
Why Are Americans Not Included in the Panama Papers? (nbcnews.com)
3154.
Hypocritical tech firms happy to do business in oppressive regimes (irishtimes.com)
3155.
Facebook's copy and crush playbook (pando.com)
3156.
Accidentally Quadratic Node.js left-pad (accidentallyquadratic.tumblr.com)
3157.
UW team stores digital images in DNA – and retrieves them perfectly (washington.edu)
3158.
Russian diplomats’ curious obsession with poetry (washingtonpost.com)
3159.
Embed Everything (medium.com)
3160.
Markets for Information Goods (1998) (people.ischool.berkeley.edu)
3161.
PerimeterX Launches and Introduces PerimeterX Bot Defender Service (marketwired.com)
3162.
A very useful tutorial about how to run Alluxio, Spark, and S3 together (alluxio.com)
3163.
Solo Design Sprint in Sydney (ruizhidong.com)
3164.
Barnum effect (en.wikipedia.org)
3165.
Derek Sivers: Do this. Directives – part 1 (sivers.org)
3166.
Getting a $250k investment actually made it harder to get to market (medium.com)
3167.
Show HN: Google Music autoplaylists (iTunes “smart playlists”) (autoplaylists.simon.codes)
3168.
Ubuntu 'snaps' for secure, transactional packages in Ubuntu 16.04 (insights.ubuntu.com)
3169.
National Security Letters are now constitutional, judge rules (arstechnica.com)
3170.
Bitcasa Drive Being Discontinued on May 20, 2016 (support.bitcasa.com)
3171.
Dead Man trailer colorized with neural network (youtube.com)
3172.
SkullConduct: Biometric User Identification Using Bone Conduction [pdf] (perceptual.mpi-inf.mpg.de)
3173.
Seeking refuge from unsafe JavaScript (blog.plaid.com)
3174.
Cocoapods iOS frameworks with storyboards, nibs and resources (medium.com)
3175.
Ask HN: What are important trends in Operating System design?
3176.
First Ascent – 3-day retreat for European computer science students (firstascent.io)
3177.
Announcing DoSelect Web Services (dws.doselect.com)
3178.
Five Essential Tools for the Analysis of Randomized Algorithms [pdf] (pdfs.semanticscholar.org)
3179.
Decimeter-Level Localization with a Single WiFi Access Point [pdf] (usenix.org)
3180.
Rebinding closures in Python (ballingt.com)