February 2018 Archive
5341.
Timing issues when using BPF with virtual CPUs (kinvolk.io)
5342.
Using Airbnb’s knowledge repo to scale your organization’s knowledge management (blog.socialcops.com)
5343.
Tesla cloud systems exploited by hackers to mine cryptocurrency (zdnet.com)
5344.
Flavors of Engineering Management (blog.benjamin-encz.de)
5345.
P2P WebTorrent-based live streaming (github.com)
5346.
A troubleshooting story: Running images with mismatched” Linux kernel versions (sysdig.com)
5347.
FAA Tapes from That Oregon UFO Incident That Sent F-15s Scrambling (thedrive.com)
5348.
Antirez on Facebook as the root cause of all evil (twitter.com)
5349.
Next-generation sequencing ushers in a golden age of genetics (hpe.com)
5350.
Cryptocurrencies ‘could drop to near-zero at any time,’ Ethereum founder warns (cnbc.com)
5351.
Optical computing for deep neural networks (fathomcomputing.com)
5352.
Show HN: A better git blame (github.com)
5353.
Jeff Bezos shares video of 10,000-year clock project (cnet.com)
5354.
Why you should be using HTML5 form validation: a tour (pageclip.co)
5355.
Show HN: Goose.us – Another blog from a wannabe philosopher
5356.
Hadoop coffee machine (twitter.com)
5357.
Affordable Test Drive of Tesla's Autopilot (driverlessratings.com)
5358.
Google Pay – Say hello to a better way to pay, by Google (blog.google)
5359.
JPL's Open Source Build-It-Yourself Rover (opensourcerover.jpl.nasa.gov)
5360.
Ringing in 2018 with 103 hacker-friendly SBCs (linuxgizmos.com)
5361.
Ask HN: Anyone working remote in NZ for a US company – how do you handle taxes?
5362.
SOLID Principles in Action: From Slack to Twilio (twilio.com)
5363.
Debian Live Image (Mate Version) Compromised
5364.
Counting Calories Is Not the Key to Weight Loss, New Study Finds (nytimes.com)
5365.
Stroke Controllable Fast Style Transfer with Adaptive Receptive Fields (yongchengjing.com)
5366.
ING says cryptocurrency exchange Bitfinex has an account with it (mobile.reuters.com)
5367.
The Malicious Use of Artificial Intelligence (maliciousaireport.com)
5368.
The Malicious Use of AI: Forecasting, Prevention, and Mitigation [pdf] (eff.org)
5369.
We developed a microscope for your phone – and published the design (theconversation.com)
5370.
Chrome Incognito mode Web Payments API details stored after closing all windows (twitter.com)