February 2019 Archive
2611.
GitHub Spray: Draw on your GitHub Contribution Graph (github.com)
2612.
The Curious Case of Convexity Confusion (googleprojectzero.blogspot.com)
2613.
It Looks Like Idera Is Gutting Travis CI Just a Few Weeks After Acquiring It (twitter.com)
2614.
The Math That Takes Newton into the Quantum World (nautil.us)
2615.
The planet has been hijacked by billionaires (boingboing.net)
2616.
WA state has a $171M bill for Comcast as major consumer protection trial ends (geekwire.com)
2617.
Colliding Blocks Act Like a Beam of Light [video] (youtube.com)
2618.
Where sex therapy meets art: the magic of Shelby Sells (huckmag.com)
2619.
Twitter Denies Having an Anti-Conservative Bias – This Time in India (buzzfeednews.com)
2620.
Progressive UX design for engineers (engineering.mixmax.com)
2621.
YouTube Is Facilitating the Sexual Exploitation of Children (youtube.com)
2622.
Data is in the eye of the beholder (sites.uw.edu)
2623.
The wonderfully weird world of Shintaro Kago, manga outsider (huckmag.com)
2624.
The Top 100 Marketing Blogs for Growth and SaaS (blog.frase.io)
2625.
Reaping the performance of fast NVM storage with uDepot [pdf] (usenix.org)
2626.
Supermicro Servers Can Be Easily Backdoored After All (tomshardware.com)
2627.
The Affinity Between Events, Streams and Serverless (confluent.io)
2628.
Woody Allen Sues Amazon Studios Claiming Breach of Contract (wsj.com)
2629.
QtNotepad: Super lightweight and super simple notepad application (github.com)
2630.
Ask HN: What Is Your Most Vivid Memory from the Dotcom Boom?
2631.
Software pirates use Apple tech to put hacked apps on iPhones (reuters.com)
2632.
Are We on the Road to Civilisation Collapse? (bbc.com)
2633.
Raspberry Pi Opens First High Street Store in Cambridge (bbc.co.uk)
2634.
Preventing SQL Injections When WAF’s Not Enough (cossacklabs.com)
2635.
Liberals and Conservatives Can Believe Fake News, but for Different Reasons (blogs.scientificamerican.com)
2636.
Ask HN: Why Did Your Business Fail?
2637.
Ask HN: What practices can we use to avoid overengineering in our projects?
2638.
Copyright Directive: how the mob was told to save the dragon and slay the knight (medium.com)
2639.
Ask HN: The way to encrypt and protect sensitive data in database
2640.
Ask HN: Life after corporate job