Lying to TCP makes it a best-effort streaming protocol
(eighty-twenty.org)
February 2018 Archive
391.
392.
393.
Cryptographers Urge People to Abandon IOTA After Leaked Emails
(spectrum.ieee.org)
394.
Distributed Databases Should Work More Like CDNs
(cockroachlabs.com)
396.
A 1700-ton telco building that was relocated while running in 1950
(99percentinvisible.org)
397.
The brazenness of the LIBOR scam
(knowledge.wharton.upenn.edu)
398.
Exploring ReasonML and functional programming
(reasonmlhub.com)
399.
Decode Like It's 1999: MPEG-1 Decoder in JavaScript
(phoboslab.org)
400.
Exploiting modern microarchitectures: Meltdown, Spectre, and other attacks [pdf]
(people.redhat.com)
401.
Doctors, Revolt
(nytimes.com)
402.
Money Laundering via Author Impersonation on Amazon
(krebsonsecurity.com)
403.
Switzerland embraces digital currencies and crypto-entrepreneurs
(economist.com)
404.
Snips Uses Rust to Build an Embedded Voice Assistant
(blog.mozilla.org)
405.
406.
Go 1.10 Release Notes
(golang.org)
407.
Lessons from starting a design-as-a-service startup
(indiehackers.com)
409.
Julia v0.7.0 Release Notes
(github.com)
410.
Scant Evidence of Power Laws Found in Real-World Networks
(quantamagazine.org)
411.
Machine Theory of Mind
(arxiv.org)
412.
The diabolical genius of the baby advice industry
(theguardian.com)
413.
Capturing Starman from 1M miles away
(deepskycolors.com)
414.
Speed Without Wizardry
(fitzgeraldnick.com)
416.
417.
418.
TDLib – Build Your Own Telegram Client
(telegram.org)
419.
420.
The Philosophy of Computer Science
(plato.stanford.edu)