August 2018 Archive
4951.
Mozilla Removes 23 Firefox Add-Ons That Snooped on Users (bleepingcomputer.com)
4952.
Pornhub subsidiary wants to pay cryptocurrency for watching porn (thenextweb.com)
4953.
Launching a side project in 10 days (medium.freecodecamp.org)
4954.
Twitter’s fear of making hard decisions is killing it (theverge.com)
4955.
OutOfLine – A Memory-Locality Pattern for High Performance C++ (blog.headlandstech.com)
4956.
Billionaires reach for the stars while world suffers (cnn.com)
4957.
New Hubble image shows 15,000 galaxies, about 12,000 of which are forming stars (nasa.gov)
4958.
Tesla factory workers reveal pain, injury and stress (theguardian.com)
4959.
Battlefield Internet: A Plan for Securing Cyberspace (foreignaffairs.com)
4960.
Preparing our software for a more dangerous Internet (pkc.io)
4961.
Chinese national took stolen secrets to China firm Elec-Tech Jury: $66M damages (mercurynews.com)
4962.
FOSS Project Spotlight: SIT (Serverless Information Tracker) (linuxjournal.com)
4963.
Overview of Linux Video Editing Software (Apr 2018) (opensource.com)
4964.
Secure Messaging Apps Comparison (securemessagingapps.com)
4965.
How Rust’s standard library was vulnerable for years and nobody noticed (medium.com)
4966.
Tim Wagner: From AWS to Coinbase (read.acloud.guru)
4967.
Why you should do Competitive Programming (devletters.com)
4968.
Things You Will Eventually Learn About JavaScript Projects (blog.usejournal.com)
4969.
H-1B use skyrocketed among Bay Area tech giants (m.phys.org)
4970.
10 Great Tips to Learn Docker (hackernoon.com)
4971.
STOP: The Counter-Intuitive Secret to Success (medium.com)
4972.
Elon Musk Didn’t Have a Breakdown (medium.com)
4973.
I replied to every HN Kismet intro for a month and a half – results (medium.com)
4974.
When democracy itself fails, and one possible solution (medium.com)
4975.
Dear Google Employees (medium.com)
4976.
Replicated data consistency explained through baseball (muratbuffalo.blogspot.com)
4977.
An Open Letter to Elon Musk (thriveglobal.com)
4978.
Pseudo constant time implementations ofTLS are only pseudo secure (eprint.iacr.org)
4979.
China’s children are its secret weapon in the global AI arms race (wired.co.uk)
4980.
Pre-announcing Solo: the first, open source, FIDO2 security key (medium.com)