August 2016 Archive
5191.
Open Source Software and the Department of Defense [pdf] (cnas.org)
5192.
KFC Accidentally Revealed the Top-Secret Recipe for Its Fried Chicken (cosmopolitan.com)
5193.
46% of Incoming C.S. Majors in UIUC's College of Engineering Are Women (chicagoinno.streetwise.co)
5194.
Some nifty little jQuery notification package (github.com)
5195.
Inside ‘The Attack That Almost Broke the Internet’ (krebsonsecurity.com)
5196.
An Ode to Boring: Creating Open and Stable Container World (medium.com)
5197.
The bizarre true story behind the “this is a work of fiction” disclaimer (slate.com)
5198.
Powerful Bit-Flipping Attack (schneier.com)
5199.
Web Scraping Tools for Extracting Online Data (rankred.com)
5200.
Java 8 implementation of some MetroHash algorithms (github.com)
5201.
Apache Beam in action: same code, several execution engines (talend.com)
5202.
Privacy-Preserving Abuse Detection in Decentralised Online Social Networks (gnunet.org)
5203.
The coming AI phase change (wimflyc.blogspot.com)
5204.
Quora is down!
5205.
CloudSigma.com is painful to setup and support rep Vladimir Petrov is an asshole (medium.com)
5206.
Opera server breach incident (opera.com)
5207.
Mastercard Propganda – Cash Is the Enemy of Financial Inclusion (globaldaily.com)
5208.
How to create trust with UX design (thenextweb.com)
5209.
The New Rules of Form Design (uxbooth.com)
5210.
Draining Oregon (oregonlive.com)
5211.
Linux debugging tools you'll love: the zine (indiegogo.com)
5212.
WhatsApp privacy backlash: Facebook angers users by harvesting their data (theguardian.com)
5213.
Robot Babies Not Effective Birth Control, Australian Study Finds (wsj.com)
5214.
Show HN: Sometimes you just need a graphical df (github.com)
5215.
DNC Creates 'Cybersecurity Board' Without Any Cybersecurity Experts (politics.slashdot.org)
5216.
Stop doing these 15 things when pitching your startup (venturebeat.com)
5217.
Systray Trashbin : MiniBin for Microsoft Windows OS (dropbox.com)
5218.
Field Guide to NYC’s Antennaes, Wiring and Cameras (observer.com)
5219.
Analyzing HTTPS Encrypted Traffic to Identify User OS, Browser and Application (arxiv.org)
5220.
A practical guide to using Node.js with Docker (blog.getjaco.com)