Visualized: The world of verified users
(blog.twitter.com)
July 2013 Archive
3451.
3452.
How Goldman Made $5 Billion By Manipulating Aluminum Inventories
(nakedcapitalism.com)
3453.
British ISPs to start filtering out porn by default
(dailymail.co.uk)
3454.
Apple confirms developer site hacked
(guardian.co.uk)
3455.
Ubuntu Forums hacked, all usernames and passwords stolen
(ubuntuforums.org)
3456.
Credit card numbers, parity and RAID
(datagenetics.com)
3457.
How Do Good Ideas Spread?
(newyorker.com)
3458.
Pre-order your Parallella supercomputer board
(shop.adapteva.com)
3459.
Introduction to visualizing networks
(jessefagan.com)
3460.
Your iOS device isn’t as encrypted as you think
(zdziarski.com)
3461.
Radian = AngularJS + D3 + open source
(openbrainsrc.github.io)
3462.
A concrete action list to get your first paying customer.
(blog.eerlings.com)
3463.
Gromacs (Open Source Molecular Dynamics) on Rescale
(blog.rescale.com)
3464.
Build Google Glass Apps in the browser on Nitrous.IO
(blog.nitrous.io)
3465.
Friedrich Nietzsche and his Typewriter – a Malling-Hansen Writing Ball
(malling-hansen.org)
3466.
Car hackers use laptop to control standard car
(bbc.co.uk)
3467.
Amazon's cloud revenues rocket up as company posts loss
(theregister.co.uk)
3468.
3470.
Google Nexus 7 review (2013)
(theverge.com)
3471.
Can someone explain Gödel's incompleteness theorems in layman terms?
(math.stackexchange.com)
3472.
Apps That Know What You Want, Before You Do
(nytimes.com)
3473.
Survivorship Bias
(youarenotsosmart.com)
3474.
Node Security Project
(nodesecurity.io)
3475.
What is it like to work with Elon Musk?
(quora.com)
3476.
Computer scientists develop 'mathematical jigsaw puzzles' to encrypt software
(newsroom.ucla.edu)
3477.
3478.
1984 Day - Rally Against Unconstitutional Surveillance
(1984day.com)
3479.