February 2015 Archive
10051.
10052.
10053.
XSS Vulnerability in IE Could Lead to Phishing Attacks
(threatpost.com)
10054.
How does dependency injection differ from just not using global variables?
(stackoverflow.com)
10055.
Eero Could Do for Wi-Fi What Nest Did for Thermostats
(fastcompany.com)
10056.
Universal Office Apps Are Now Available on Windows 10
(thenextweb.com)
10057.
The FCC’s net neutrality proposal has a loophole
(gigaom.com)
10058.
Breach of trust
(sciencemag.org)
10059.
Web Components
(intertwingly.net)
10060.
How the Middle East’s First Nuclear War Started (2014)
(politico.com)
10061.
Making of: Microsoft’s first official Docker image
(ahmetalpbalkan.com)
10062.
MyScriptFont – create a vector font from your own handwriting
(myscriptfont.com)
10063.
How to Update the BIOS Firmware on the Supermicro Server (X9DRW-iF)
(blog.smalleycreative.com)
10064.
Can a Computer Make You Cry?
(chrishecker.com)
10065.
Outreach Program to Join Conservancy from Gnome; Program Renames to Outreachy
(sfconservancy.org)
10066.
Building a new sitespeed.io
(peterhedenskog.com)
10067.
Simple Testing Can Prevent Most Failures
(usenix.org)
10068.
How Much Is Tax Software Worth?
(backed.io)
10069.
10070.
10071.
Functional programming in JSON for distributed app
(github.com)
10072.
10073.
TRACER FIRE replica
(github.com)
10074.
The Pmarca Guide to Startups: The only thing that matters
(web.archive.org)
10075.
10076.
Add a dash of quantum for secure cloud computing
(newscientist.com)
10077.
10078.
You Can’t Rely on a VC to Make Your Hardest Decisions
(bothsidesofthetable.com)
10079.
Chef Cookbook Continuous Integration
(joshsymonds.com)
10080.
3 Presentation tips to connect you with the toughest audience
(mindfulpresenter.com)