April 2016 Archive
2071.
Apple's bid to stay in the big time (1983) (guidebookgallery.org)
2072.
Let's Encrypt Reaches 2M Certificates (eff.org)
2073.
Debugging Memory Corruption: Who the hell writes “2” into my stack? (blogs.unity3d.com)
2074.
Pivotal Spinoff SnappyData, OLTP/OLAP database built on Spark, Raises $3.65M (fortune.com)
2075.
Plenty of Passengers, but Where Are the Pilots? (nytimes.com)
2076.
Urban Myths about SQL (2015) (docslide.us)
2077.
Business in Africa: 1.2B opportunities (economist.com)
2078.
Outshone by Smaller Screens, PCs Aim to Be Seen as Cool Again (nytimes.com)
2079.
Why smart people have no friends (medium.com)
2080.
Del.icio.us has been down since it's “migration” on Sunday (blog.delicious.com)
2081.
Apply HN – LACKII
2082.
Show HN: I built a mirror that you can touch (youtube.com)
2083.
Vintage Computer Fans Keep the Great Machines of the Past Running (spectrum.ieee.org)
2084.
“it seems that Fenix finally reached Twitter tokens limit” (twitter.com)
2085.
Xscreensaver Author: “Please Remove XScreenSaver from Debian Linux” (bugs.debian.org)
2086.
Kubernetes Namespaces, Resource Quota, and Limits (blog.codeship.com)
2087.
Bayes's Rule (arbital.com)
2088.
Apple pulls all non-official Reddit apps due to NSFW content (reddit.com)
2089.
Human mind excels at quantum-physics computer game (nature.com)
2090.
Twitter’s Fabric now serves 2B active devices (fabric.io)
2091.
Scala on Tessel 2 via Scala.js (blog.bruchez.name)
2092.
Airbnb's Brian Chesky on Y Combinator's Success Stories [video] (bloomberg.com)
2093.
Ask HN: Do you use either C# or Java in your professional work?
2094.
Tech Shares Fail to Join the Party (wsj.com)
2095.
Bang Bang Control (en.wikipedia.org)
2096.
What the iPhone has done to cameras is completely insane (washingtonpost.com)
2097.
Ask HN: I have ~12hrs of free dev time a week. How do I turn that into money?
2098.
Ask HN: My website is better than my competitor's, how do I bring traffic?
2099.
Apple extends iPhone production cut for another quarter (asia.nikkei.com)
2100.
“Whaling” emerges as cybersecurity threat (cio.com)